Sciweavers

10674 search results - page 1951 / 2135
» The Virtual Environment - Another Approach
Sort
View
WIS
2004
15 years 6 months ago
AuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...
Christina Braz, Esma Aïmeur
150
Voted
WSCG
2001
167views more  WSCG 2001»
15 years 6 months ago
Component-Based Architectures for Computer Vision Systems
Research performed in the field of computer vision has steadily ignored recent advances in programming tools and techniques, relying on well-established traditional methods, such ...
A. Economopoulos, Drakoulis Martakos
LISA
2003
15 years 6 months ago
EasyVPN: IPsec Remote Access Made Easy
Telecommuting and access over a Wireless LAN require strong security at the network level. Although IPsec is well-suited for this task, it is difficult to configure and operate ...
Mark C. Benvenuto, Angelos D. Keromytis
130
Voted
MASCOTS
2003
15 years 6 months ago
An Evaluation Framework For Active Queue Management Schemes
Over the last decade numerous Active Queue Management (AQM) schemes have been proposed in the literature. Many of these studies have been directed towards improving congestion con...
Arkaitz Bitorika, Mathieu Robin, Meriel Huggard
WSCG
2004
121views more  WSCG 2004»
15 years 6 months ago
User-Centric Transfer Function Specification in Augmented Reality
The quality of a 3D volume visualization heavily depends on a representative transfer function which is responsible for mapping the original density values to color and opacity. F...
Bernhard Reitinger, Christopher Zach, Alexander Bo...
« Prev « First page 1951 / 2135 Last » Next »