Sciweavers

77 search results - page 14 / 16
» A User Authentication System Using Schema of Visual Memory
Sort
View
3DPVT
2006
IEEE
159views Visualization» more  3DPVT 2006»
14 years 1 months ago
Interactive Modeling with Automatic Online Compression
A few 3D interactive modeling systems have been developed recently. Such systems must cope with a high flow of input measurements during the entire acquisition period. Therefore, ...
Jean-Daniel Deschênes, Philippe Lambert, Pat...
EDBTW
2010
Springer
13 years 10 months ago
Text-to-query: dynamically building structured analytics to illustrate textual content
Successfully structuring information in databases, OLAP cubes, and XML is a crucial element in managing data nowadays. However this process brought new challenges to usability. It...
Raphaël Thollot, Falk Brauer, Wojciech M. Bar...
CCS
2004
ACM
14 years 22 days ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
TISSEC
2008
106views more  TISSEC 2008»
13 years 7 months ago
On predictive models and user-drawn graphical passwords
In commonplace text-based password schemes, users typically choose passwords that are easy to recall, exhibit patterns, and are thus vulnerable to brute-force dictionary attacks. ...
Paul C. van Oorschot, Julie Thorpe
AUGHUMAN
2010
13 years 5 months ago
Aided eyes: eye activity sensing for daily life
Our eyes collect a considerable amount of information when we use them to look at objects. In particular, eye movement allows us to gaze at an object and shows our level of intere...
Yoshio Ishiguro, Adiyan Mujibiya, Takashi Miyaki, ...