Sciweavers

221 search results - page 11 / 45
» Advantages of User Authentication Using Unclear Images
Sort
View
TEI
2009
ACM
92views Hardware» more  TEI 2009»
14 years 3 months ago
TinkerSheets: using paper forms to control and visualize tangible simulations
This paper describes TinkerSheets, a paper-based interface to tangible simulations. The proposed interface combines the advantages of form-based input and paper. Form-based input ...
Guillaume Zufferey, Patrick Jermann, Auréli...
CHI
2010
ACM
14 years 3 months ago
Usability and strength in click-based graphical passwords
Click-based graphical passwords have attractive usability properties, such as cueing and good memorability. However, image size and number of click-points in each password signifi...
Elizabeth Stobert
ISBI
2008
IEEE
14 years 9 months ago
Tracking of cells in a sequence of images using a low-dimension image representation
We propose a new image analysis method to segment and track cells in a growing colony. By using an intermediate low-dimension image representation yielded by a reliable over-segme...
Alice Demarez, Ariel B. Lindner, François T...
JCDL
2003
ACM
195views Education» more  JCDL 2003»
14 years 1 months ago
An Application of Multiple Viewpoints to Content-Based Image Retrieval
Content-based image retrieval uses features that can be extracted from the images themselves. Using more than one representation of the images in a collection can improve the resu...
James C. French, A. C. Chapin, Worthy N. Martin
SCN
2010
Springer
138views Communications» more  SCN 2010»
13 years 6 months ago
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
In this work, we consider Authentication and Key Agreement (AKA), a popular client-server Key Exchange (KE) protocol, commonly used in wireless standards (e.g., UMTS), and widely c...
Vladimir Kolesnikov