Sciweavers

221 search results - page 31 / 45
» Advantages of User Authentication Using Unclear Images
Sort
View
MOBISYS
2011
ACM
12 years 11 months ago
TagSense: a smartphone-based approach to automatic image tagging
Mobile phones are becoming the convergent platform for personal sensing, computing, and communication. This paper attempts to exploit this convergence towards the problem of autom...
Chuan Qin, Xuan Bao, Romit Roy Choudhury, Srihari ...
ACSAC
2010
IEEE
13 years 6 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
ISMAR
2008
IEEE
14 years 2 months ago
In-place Augmented Reality
In this paper we present a new vision-based approach for transmitting virtual models for Augmented Reality (AR). A two dimensional representation of the virtual models is embedded...
Nate Hagbi, Oriel Bergig, Jihad El-Sana, Klara Ked...
DILS
2008
Springer
13 years 10 months ago
VisGenome and Ensembl: Usability of Integrated Genome Maps
It is not always clear how best to represent integrated data sets, and which application and database features allow a scientist to take best advantage of data coming from various ...
Joanna Jakubowska, Ela Hunt, John McClure, Matthew...
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 8 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...