Sciweavers

700 search results - page 93 / 140
» words 2005
Sort
View
ESORICS
2007
Springer
15 years 3 months ago
Graphical Password Authentication Using Cued Click Points
We propose and examine the usability and security of Cued Click Points (CCP), a cued-recall graphical password technique. Users click on one point per image for a sequence of image...
Sonia Chiasson, Paul C. van Oorschot, Robert Biddl...
INDOCRYPT
2007
Springer
15 years 3 months ago
Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication
This paper analyzes the best speeds that can be obtained for single-scalar multiplication with variable base point by combining a huge range of options: – many choices of coordin...
Daniel J. Bernstein, Peter Birkner, Tanja Lange, C...
68
Voted
ICMCS
2006
IEEE
139views Multimedia» more  ICMCS 2006»
15 years 3 months ago
A Measure for Evaluating Retrieval Techniques based on Partially Ordered Ground Truth Lists
For the RISM A/II collection of musical incipits (short extracts of scores, taken from the beginning), we have established a ground truth based on the opinions of human experts. I...
Rainer Typke, Remco C. Veltkamp, Frans Wiering
SIGIR
2006
ACM
15 years 3 months ago
Bias and the limits of pooling
Modern retrieval test collections are built through a process called pooling in which only a sample of the entire document set is judged for each topic. The idea behind pooling is...
Chris Buckley, Darrin Dimmick, Ian Soboroff, Ellen...
AINA
2005
IEEE
15 years 3 months ago
Design and Implementation of IPv6 Anycast Routing Protocol: PIA-SM
Today, the use of anycast address is quite limited. One of the reasons is because there is no routing protocol providing a global anycasting service. In this paper we design and im...
Satoshi Matsunaga, Shingo Ata, Hiroshi Kitamura, M...