Sciweavers

1050 search results - page 29 / 210
» Two methods of authenticated positioning
Sort
View
IJNSEC
2007
121views more  IJNSEC 2007»
14 years 11 months ago
Injecting Heterogeneity Through Protocol Randomization
In this paper, we argue that heterogeneity should be an important principle in design and use of cryptographic protocols. We use automated formal analysis tools to randomly genera...
Li Zhuang, J. D. Tygar, Rachna Dhamija
CAIP
2009
Springer
325views Image Analysis» more  CAIP 2009»
15 years 6 months ago
Finger-Knuckle-Print Verification Based on Band-Limited Phase-Only Correlation
This paper investigates a new automated personal authentication technique using finger-knuckle-print (FKP) imaging. First, a specific data acquisition device is developed to captur...
Lin Zhang, Lei Zhang, David Zhang
72
Voted
AIED
2007
Springer
15 years 6 months ago
Explaining Self-Explaining: A Contrast between Content and Generation
Self-explaining has been repeatedly shown to result in positive learning outcomes for students in a wide variety of disciplines. However, there are two potential accounts for why s...
Robert G. M. Hausmann, Kurt VanLehn
CAD
2004
Springer
14 years 11 months ago
Graphics-assisted Rolling Ball Method for 5-axis surface machining
In this paper, a graphics hardware-assisted approach to 5-axis surface machining is presented that builds upon a tool positioning strategy named the Rolling Ball Method presented ...
Paul J. Gray, Fathy Ismail, Sanjeev Bedi
JSS
2000
86views more  JSS 2000»
14 years 11 months ago
Evaluation of code review methods through interviews and experimentation
This paper presents the results of a study where the effects of introducing code reviews in an organisational unit have been evaluated. The study was performed in an ongoing comme...
Martin Höst, Conny Johansson