Sciweavers

1573 search results - page 297 / 315
» Strong User Authentication
Sort
View
USS
2008
14 years 12 months ago
The Practical Subtleties of Biometric Key Generation
The inability of humans to generate and remember strong secrets makes it difficult for people to manage cryptographic keys. To address this problem, numerous proposals have been s...
Lucas Ballard, Seny Kamara, Michael K. Reiter
AVI
2004
14 years 11 months ago
Integrating expanding annotations with a 3D explosion probe
Understanding complex 3D virtual models can be difficult, especially when the model has interior components not initially visible and ancillary text. We describe new techniques fo...
Henry Sonnet, M. Sheelagh T. Carpendale, Thomas St...
CSAC
2006
14 years 11 months ago
Managing Network Troubles while Interacting within Collaborative Virtual Environments
Abstract. We are interested in real time collaborative interactions within Collaborative Virtual Environments (CVE). This domain relies on the low latency offered by high speed net...
Thierry Duval, Chadi El Zammar
116
Voted
IADIS
2004
14 years 11 months ago
A Study on Mobile Game Adoption Under HPI(High-Speed Portable Internet) Environment
Mobile game is considered as one of the emerging mobile services in recent years. A number of mobile game companies have been established and on-line game providers have also atte...
Young Seog Yoon, Im Sook Há, Mun Kee Choi
96
Voted
MM
2010
ACM
151views Multimedia» more  MM 2010»
14 years 10 months ago
Explicit and implicit concept-based video retrieval with bipartite graph propagation model
The major scientific problem for content-based video retrieval is the semantic gap. Generally speaking, there are two appropriate ways to bridge the semantic gap: the first one is...
Lei Bao, Juan Cao, Yongdong Zhang, Jintao Li, Ming...