Sciweavers

920 search results - page 39 / 184
» Selecting Secure Passwords
Sort
View
AGENTS
2001
Springer
15 years 10 months ago
A reinforcement learning model of selective visual attention
Ì × Ô Ô Ö ÔÖÓÔÓ× × ÑÓ Ð Ó × Ð Ø Ú ØØ ÒØ ÓÒ ÓÖ Ú ×Ù Ð × Ö Ø × ×¸ × ÓÒ Ö Ñ ÛÓÖ ÓÖ × ÕÙ ÒØ Ð × ÓÒ¹ Ñ Ò º Ì ÑÓ Ð × Ñ...
Silviu Minut, Sridhar Mahadevan
AGENTS
2001
Springer
15 years 10 months ago
An architecture for action selection in robotic soccer
ÅÍÒ Ø ¹ Û × Ø ½ ÊÓ Ó ÙÔ ÖÓ ÓØ ×Ó Ö × ÑÙ¹ Ð ØÓÖ Ð Ù ÑÔ ÓÒº ÁÒ Ø ÊÓ Ó ÙÔ¹¾¼¼¼ ÓÑÔ Ø Ø ÓÒ¸ ÅÍÒ Ø ¹ Û × ÒØ Ö Ò Ò ...
Peter Stone, David A. McAllester
ISW
2010
Springer
15 years 3 months ago
Implicit Authentication through Learning User Behavior
Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these...
Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Ch...
CRYPTO
2012
Springer
215views Cryptology» more  CRYPTO 2012»
13 years 7 months ago
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
We develop a new methodology for utilizing the prior techniques to prove selective security for functional encryption systems as a direct ingredient in devising proofs of full sec...
Allison B. Lewko, Brent Waters