Sciweavers

973 search results - page 165 / 195
» Usability: not as we know it!
Sort
View
DIM
2008
ACM
15 years 3 months ago
Minimal information disclosure with efficiently verifiable credentials
Public-key based certificates provide a standard way to prove one's identity, as attested by some certificate authority (CA). However, plain certificates provide a binary ide...
David Bauer, Douglas M. Blough, David Cash
ACL
2006
15 years 3 months ago
URES : an Unsupervised Web Relation Extraction System
Most information extraction systems either use hand written extraction patterns or use a machine learning algorithm that is trained on a manually annotated corpus. Both of these a...
Binyamin Rosenfeld, Ronen Feldman
CVPR
1999
IEEE
16 years 4 months ago
Using the Condensation Algorithm for Robust, Vision-based Mobile Robot Localization
To navigate reliably in indoor environments, a mobile robot must know where it is. This includes both the ability of globally localizing the robot from scratch, as well as trackin...
Frank Dellaert, Wolfram Burgard, Dieter Fox, Sebas...
ICSE
2007
IEEE-ACM
16 years 2 months ago
A Future for Software Engineering?
This paper suggests the need for a software engineering research community conversation about the future that the community would like to have. The paper observes that the researc...
Leon J. Osterweil
AFRICACRYPT
2009
Springer
15 years 8 months ago
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed
We present the first simple power analysis (SPA) of software implementations of KeeLoq. Our attack drastically reduces the efforts required for a complete break of remote keyless...
Markus Kasper, Timo Kasper, Amir Moradi, Christof ...