Sciweavers

1573 search results - page 281 / 315
» Strong User Authentication
Sort
View
WEBNET
2000
14 years 11 months ago
Mining the Most Interesting Web Access Associations
: Web access patterns can provide valuable information for website designers in making website-based communication more efficient. To extract interesting or useful web access patte...
Li Shen, Ling Cheng, James Ford, Fillia Makedon, V...
DAGM
2010
Springer
14 years 10 months ago
Interactive Motion Segmentation
Interactive motion segmentation is an important task for scene understanding and analysis. Despite recent progress state-of-theart approaches still have difficulties in adapting to...
Claudia Nieuwenhuis, Benjamin Berkels, Martin Rump...
FC
2010
Springer
260views Cryptology» more  FC 2010»
14 years 10 months ago
Lightweight Cryptography and DPA Countermeasures: A Survey
Abstract. The dawning Ubiquitous Computing age demands a new attacker model for the myriads of pervasive computing devices used: since a potentially malicious user is in full contr...
Amir Moradi, Axel Poschmann
DGO
2009
118views Education» more  DGO 2009»
14 years 10 months ago
Towards collaborative web-based impact assessment
Impact assessment (IA) is a key method for the legislator to evaluate policies, norms or regulations currently under development. Experts use IA to gather and analyze input from m...
Clemens Heidinger, Erik Buchmann, Klemens Böh...
ICASSP
2010
IEEE
14 years 10 months ago
Optimize the obvious: Automatic call flow generation
In commercial spoken dialog systems, call flows are built by call flow designers implementing a predefined business logic. While it may appear obvious from this logic how the c...
David Suendermann, Jackson Liscombe, Roberto Piera...