Sciweavers

9162 search results - page 1560 / 1833
» System and User Data Complexity
Sort
View
148
Voted
ACMICEC
2008
ACM
253views ECommerce» more  ACMICEC 2008»
15 years 6 months ago
Secure and efficient protocol for mobile payments
Electronic Payments have gained tremendous popularity in the modern world. Credit/debit cards and online payments are in widespread use. Bringing electronic payments to the mobile...
Rahul M. Godbole, Alwyn R. Pais
ASSETS
2008
ACM
15 years 6 months ago
Understanding pointing problems in real world computing environments
Understanding how pointing performance varies in real world computer use and over time can provide valuable insight about how systems should accommodate changes in pointing behavi...
Amy Hurst, Jennifer Mankoff, Scott E. Hudson
136
Voted
APSCC
2006
IEEE
15 years 6 months ago
GlobalWatch: A Distributed Service Grid Monitoring Platform with High Flexibility and Usability
GlobalWatch is a distributed platform to monitor various resources of grid platforms so as to improve the flexibility and usability of grid systems. In order to enhance the flexib...
Sheng Di, Hai Jin, Shengli Li, Ling Chen, Chengwei...
130
Voted
LREC
2010
229views Education» more  LREC 2010»
15 years 5 months ago
Building a Node of the Accessible Language Technology Infrastructure
We present a limited prototype of the CLARIN Language Technology Infrastructure (LTI) node, which provides several types of web services for Polish. The functionality encompasses ...
Bartosz Broda, Michal Marcinczuk, Maciej Piasecki
159
Voted
DICTA
2007
15 years 5 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
« Prev « First page 1560 / 1833 Last » Next »