Sciweavers

67 search results - page 12 / 14
» reflection 1999
Sort
View
TISSEC
2008
106views more  TISSEC 2008»
14 years 10 months ago
On predictive models and user-drawn graphical passwords
In commonplace text-based password schemes, users typically choose passwords that are easy to recall, exhibit patterns, and are thus vulnerable to brute-force dictionary attacks. ...
Paul C. van Oorschot, Julie Thorpe
ASE
1999
126views more  ASE 1999»
14 years 9 months ago
Behaviour Analysis of Distributed Systems Using the Tracta Approach
Behaviour analysis should form an integral part of the software development process. This is particularly important in the design of concurrent and distributed systems, where comp...
Dimitra Giannakopoulou, Jeff Kramer, Shing-Chi Che...
CAD
1999
Springer
14 years 9 months ago
Set-combinations of the mixed-dimension cellular objects of the Djinn API
This paper is concerned with the mathematics and formal specification of "set-like" operations for the mixed dimension cellular objects of the Djinn Application Programm...
Alan E. Middleditch, Chris Reade, Abel J. P. Gomes
APGV
2008
ACM
193views Visualization» more  APGV 2008»
15 years 4 days ago
Probing dynamic human facial action recognition from the other side of the mean
Insights from human perception of moving faces have the potential to provide interesting insights for technical animation systems as well as in the neural encoding of facial expre...
Cristóbal Curio, Martin A. Giese, Martin Br...
ICCV
1999
IEEE
16 years 1 days ago
Calibration of Hand-Held Camera Sequences for Plenoptic Modeling
In this contribution we focus on the calibration of very long image sequences from a hand-held camera that samples the viewing sphere of a scene. View sphere sampling is important...
Reinhard Koch, Marc Pollefeys, Benno Heigl, Luc J....