Sciweavers

1661 search results - page 239 / 333
» Advanced carving techniques
Sort
View
DICTA
2007
13 years 10 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
MASCOTS
2010
13 years 10 months ago
RRDtrace: Long-term Raw Network Traffic Recording using Fixed-size Storage
Recording raw network traffic for long-term periods can be extremely beneficial for a multitude of monitoring and security applications. However, storing all traffic of high volume...
Antonis Papadogiannakis, Michalis Polychronakis, E...
HCI
2007
13 years 10 months ago
RFID Cards: A New Deal for Elderly Accessibility
Elderly adults face two serious challenges bridging the digital divide. First, many suffer from physical or cognitive disabilities, which inhibit computer use. Second, the “tradi...
Robert Pastel, Charles Wallace, Jesse Heines
LREC
2008
96views Education» more  LREC 2008»
13 years 10 months ago
An Empirical Approach to a Preliminary Successful Identification and Resolution of Temporal Expressions in Spanish News Corpora
Dating of contents is relevant to multiple advanced Natural Language Processing (NLP) applications, such as Information Retrieval or Question Answering. These could be improved by...
Maria Teresa Vicente-Díez, Doaa Samy, Palom...
IJCAI
2007
13 years 10 months ago
Locating Complex Named Entities in Web Text
Named Entity Recognition (NER) is the task of locating and classifying names in text. In previous work, NER was limited to a small number of predefined entity classes (e.g., peop...
Doug Downey, Matthew Broadhead, Oren Etzioni