Sciweavers

9310 search results - page 1684 / 1862
» User interface continuations
Sort
View
CCS
2004
ACM
15 years 5 months ago
A PIN-entry method resilient against shoulder surfing
Magnetic stripe cards are in common use for electronic payments and cash withdrawal. Reported incidents document that criminals easily pickpocket cards or skim them by swiping the...
Volker Roth, Kai Richter, Rene Freidinger
ATAL
2006
Springer
15 years 5 months ago
Evaluating a computational model of social causality and responsibility
Intelligent agents are typically situated in a social environment and must reason about social cause and effect. Such reasoning is qualitatively different from physical causal rea...
Wenji Mao, Jonathan Gratch
CSFW
2004
IEEE
15 years 5 months ago
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library
Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protocol environ...
Michael Backes, Birgit Pfitzmann
DASFAA
2004
IEEE
156views Database» more  DASFAA 2004»
15 years 5 months ago
Automatic Generation of SQLX View Definitions from ORA-SS Views
Abstract. Although XML is the dominant standard for publishing and exchanging data for Internet-based business applications, data is typically stored in relational or object-relati...
Ya Bing Chen, Tok Wang Ling, Mong-Li Lee
CICLING
2006
Springer
15 years 5 months ago
NLP (Natural Language Processing) for NLP (Natural Language Programming)
Abstract. Natural Language Processing holds great promise for making computer interfaces that are easier to use for people, since people will (hopefully) be able to talk to the com...
Rada Mihalcea, Hugo Liu, Henry Lieberman
« Prev « First page 1684 / 1862 Last » Next »