Sciweavers

4306 search results - page 371 / 862
» Timed Testing with TorX
Sort
View
135
Voted
AVI
2006
15 years 5 months ago
Design and evaluation of a shoulder-surfing resistant graphical password scheme
When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can capture a password by direct observation or by record...
Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, Je...
138
Voted
FLAIRS
2004
15 years 5 months ago
A Faster Algorithm for Generalized Multiple-Instance Learning
In our prior work, we introduced a generalization of the multiple-instance learning (MIL) model in which a bag's label is not based on a single instance's proximity to a...
Qingping Tao, Stephen D. Scott
139
Voted
SDM
2004
SIAM
141views Data Mining» more  SDM 2004»
15 years 4 months ago
Visually Mining through Cluster Hierarchies
Similarity search in database systems is becoming an increasingly important task in modern application domains such as multimedia, molecular biology, medical imaging, computer aid...
Stefan Brecheisen, Hans-Peter Kriegel, Peer Kr&oum...
147
Voted
AAAI
2000
15 years 4 months ago
Graph Construction and Analysis as a Paradigm for Plan Recognition
We present a novel approach to plan recognition in which graph construction and analysis is used as a paradigm. We use a graph structure called a Goal Graph for the plan recogniti...
Jun Hong
128
Voted
USITS
2003
15 years 4 months ago
Why Do Internet Services Fail, and What Can Be Done About It?
In 1986 Jim Gray published his landmark study of the causes of failures of Tandem systems and the techniques Tandem used to prevent such failures [6]. Seventeen years later, Inter...
David L. Oppenheimer, Archana Ganapathi, David A. ...