Sciweavers

1050 search results - page 13 / 210
» Two methods of authenticated positioning
Sort
View
IRAL
2003
ACM
15 years 5 months ago
Extraction of user preferences from a few positive documents
In this work, we propose a new method for extracting user preferences from a few documents that might interest users. For this end, we first extract candidate terms and choose a n...
Byeong Man Kim, Qing Li, Jong-Wan Kim
ACSAC
2005
IEEE
15 years 5 months ago
Graphical Passwords: A Survey
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend ...
Xiaoyuan Suo, Ying Zhu, G. Scott Owen
EUSAI
2007
Springer
15 years 5 months ago
How Computer Vision Can Help in Outdoor Positioning
Localization technologies have been an important focus in ubiquitous computing. This paper explores an underrepresented area, namely computer vision technology, for outdoor positio...
Ulrich Steinhoff, Dusan Omercevic, Roland Perko, B...
WCE
2007
15 years 25 days ago
Estimation for Strictly Positive Stable Laws
Abstract—Positive stable laws have become a standard tool in modelling heavy tailed data in such diverse areas as finance, engineering and survival analysis. Due to the non–ex...
Simos G. Meintanis
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 5 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...