Sciweavers

340 search results - page 17 / 68
» A Simple User Authentication Scheme for Grid Computing
Sort
View
ICAD
2004
13 years 9 months ago
Data Set Selection for a Constrained Simple Sonification
Previous work on the production and test of various sonifications has shown that adding a sonification to an interface can assist the execution of a variety of operator tasks [1,2...
Shawn C. Garner
GECCO
2007
Springer
170views Optimization» more  GECCO 2007»
14 years 1 months ago
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Keystroke authentication is a biometric method utilizing the typing characteristics of users. In this paper, we propose an evolutionary method for stable keystroke authentication....
Jae-Wook Lee, Sung-Soon Choi, Byung Ro Moon
VISSYM
2004
13 years 9 months ago
Isosurface Computation Made Simple
This paper presents a simple approach for rendering isosurfaces of a scalar field. Using the vertex programming capability of commodity graphics cards, we transfer the cost of com...
Valerio Pascucci
GPC
2009
Springer
14 years 10 days ago
Capacity Planning in Economic Grid Markets
Abstract. Due to the few computing resource planning options currently available in Grid computing, capacity planning, an old discipline for analyzing resource purchases, is simple...
Marcel Risch, Jörn Altmann
CSREASAM
2006
13 years 9 months ago
The Analyses of Key Stroke Timings using Self Organizing Maps and its Application to Authentication
Recently, security of the computer systems becomes an important problem. Almost all computers use the password mechanism for the user authentication. But password mechanism has ma...
Hiroshi Dozono, Yoshio Noguchi, Masanori Nakakuni,...