Sciweavers

1573 search results - page 185 / 315
» Strong User Authentication
Sort
View
95
Voted
TVCG
2008
86views more  TVCG 2008»
15 years 1 months ago
The Shaping of Information by Visual Metaphors
The nature of an information visualization can be considered to lie in the visual metaphors it uses to structure information. The process of understanding a visualization therefore...
Caroline Ziemkiewicz, Robert Kosara
AAI
2000
427views more  AAI 2000»
15 years 1 months ago
Applying Artificial Intelligence to Virtual Reality: Intelligent Virtual Environments
Reearch into virtual environments on the one hand and artificial intelligence and artificial life on the other has largely been carried out by two different groups of people with ...
Michael Luck, Ruth Aylett
ACL
2010
14 years 12 months ago
An Active Learning Approach to Finding Related Terms
We present a novel system that helps nonexperts find sets of similar words. The user begins by specifying one or more seed words. The system then iteratively suggests a series of ...
David Vickrey, Oscar Kipersztok, Daphne Koller
WICON
2008
15 years 3 months ago
Security vulnerabilities in IEEE 802.22
Cognitive Radio (CR) is seen as one of the enabling technologies for realizing a new spectrum access paradigm, viz. Opportunistic Spectrum Sharing (OSS). IEEE 802.22 is the world&...
Kaigui Bian, Jung Min Park
ICHIM
2001
123views more  ICHIM 2001»
15 years 3 months ago
Digital Video and Hypermedia Based New Services for Working on Patrimonial Archives
The "Institut National de I'Audiovisuel" (1NA) is in charge of keeping records of national TV broadcasts. Its main function is to provide TV producers with authenti...
Marc Nanard, Jocelyne Nanard, David Genest, Michel...