Sciweavers

1050 search results - page 8 / 210
» Two methods of authenticated positioning
Sort
View
SIGMOD
2009
ACM
157views Database» more  SIGMOD 2009»
15 years 9 months ago
Authenticated join processing in outsourced databases
Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner's signature. Previous aut...
Yin Yang, Dimitris Papadias, Stavros Papadopoulos,...
71
Voted
SOUPS
2010
ACM
15 years 1 months ago
Towards understanding ATM security: a field study of real world ATM use
With the increase of automated teller machine (ATM) frauds, new authentication mechanisms are developed to overcome security problems of personal identification numbers (PIN). Th...
Alexander De Luca, Marc Langheinrich, Heinrich Hus...
LREC
2008
120views Education» more  LREC 2008»
14 years 11 months ago
Exploiting the Role of Position Feature in Chinese Relation Extraction
Relation extraction is the task of finding pre-defined semantic relations between two entities or entity mentions from text. Many methods, such as feature-based and kernel-based m...
Peng Zhang, Wenjie Li, Furu Wei, Qin Lu, Yuexian H...
158
Voted
AR
2011
14 years 4 months ago
Imitation Learning of Positional and Force Skills Demonstrated via Kinesthetic Teaching and Haptic Input
A method to learn and reproduce robot force interactions in a Human-Robot Interaction setting is proposed. The method allows a robotic manipulator to learn to perform tasks which ...
Petar Kormushev, Sylvain Calinon, Darwin G. Caldwe...
85
Voted
HICSS
2008
IEEE
132views Biometrics» more  HICSS 2008»
15 years 4 months ago
Support of Case-Based Authentic Learning Activities: A Collaborative Case Commenting Tool and a Collaborative Case Builder
Cases are widely used in professional education to engage learners with examples of real world practices. Collaboration in casebased learning can add to the authenticity of the ex...
Lu Xiao, John M. Carroll, Pat Clemson, Mary Beth R...