Sciweavers

128 search results - page 24 / 26
» A Detailed Analysis of SAFER K
Sort
View
SOUPS
2010
ACM
13 years 11 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
EDBT
2009
ACM
106views Database» more  EDBT 2009»
13 years 11 months ago
AlphaSum: size-constrained table summarization using value lattices
Consider a scientist who wants to explore multiple data sets to select the relevant ones for further analysis. Since the visualization real estate may put a stringent constraint o...
K. Selçuk Candan, Huiping Cao, Yan Qi 0002,...
BMCBI
2008
118views more  BMCBI 2008»
13 years 7 months ago
Evaluation of phylogenetic footprint discovery for predicting bacterial cis-regulatory elements and revealing their evolution
Background: The detection of conserved motifs in promoters of orthologous genes (phylogenetic footprints) has become a common strategy to predict cis-acting regulatory elements. S...
Rekin's Janky, Jacques van Helden
CCE
2007
13 years 7 months ago
A systematic approach for soft sensor development
This paper presents a systematic approach based on robust statistical techniques for development of a data-driven soft sensor, which is an important component of the process analy...
Bao Lin, Bodil Recke, Jørgen K. H. Knudsen,...
PAMI
2006
186views more  PAMI 2006»
13 years 7 months ago
Performance Evaluation of Fingerprint Verification Systems
This paper is concerned with the performance evaluation of fingerprint verification systems. After an initial classification of biometric testing initiatives, we explore both the t...
Raffaele Cappelli, Dario Maio, Davide Maltoni, Jam...