Sciweavers

4273 search results - page 819 / 855
» User studies and the design of Natural Language Systems
Sort
View
IACR
2011
137views more  IACR 2011»
14 years 1 months ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...
162
Voted
SOUPS
2010
ACM
15 years 5 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
DEXA
2009
Springer
188views Database» more  DEXA 2009»
15 years 5 months ago
On-the-Fly Integration and Ad Hoc Querying of Life Sciences Databases Using LifeDB
Data intensive applications in Life Sciences extensively use the Hidden Web as a platform for information sharing. Access to these heterogeneous Hidden Web resources is limited thr...
Anupam Bhattacharjee, Aminul Islam, Mohammad Shafk...
CPHYSICS
2006
119views more  CPHYSICS 2006»
15 years 1 months ago
GDF: A tool for function estimation through grammatical evolution
This article introduces a tool for data fitting that is based on genetic programming and especially on the grammatical evolution technique. The user needs to input a series of poi...
Ioannis G. Tsoulos, Dimitris Gavrilis, Evangelos D...
114
Voted
COMPGEOM
2006
ACM
15 years 7 months ago
Algorithms for two-box covering
We study the problem of covering a set of points or polyhedra in 3 with two axis-aligned boxes in order to minimize a function of the measures of the two boxes, such as the sum or...
Esther M. Arkin, Gill Barequet, Joseph S. B. Mitch...