Sciweavers

221 search results - page 32 / 45
» Advantages of User Authentication Using Unclear Images
Sort
View
FAC
2007
128views more  FAC 2007»
13 years 8 months ago
Verifying a signature architecture: a comparative case study
Abstract. We report on a case study in applying different formal methods to model and verify an architecture for administrating digital signatures. The architecture comprises seve...
David A. Basin, Hironobu Kuruma, Kunihiko Miyazaki...
CCS
2011
ACM
12 years 8 months ago
PaperSpeckle: microscopic fingerprinting of paper
Paper forgery is among the leading causes of corruption in many developing regions [2]. In this paper, we introduce PaperSpeckle, a robust system that leverages the natural random...
Ashlesh Sharma, Lakshminarayanan Subramanian, Eric...
ICPR
2006
IEEE
14 years 9 months ago
Object and Scene Classification: what does a Supervised Approach Provide us?
Given a set of images of scenes containing different object categories (e.g. grass, roads) our objective is to discover these objects in each image, and to use this object occurre...
Anna Bosch, Arnau Oliver, Robert Marti, Xavier Mu&...
ECIR
2006
Springer
13 years 9 months ago
A Comparative Study of the Effectiveness of Search Result Presentation on the Web
Presentation of search results in Web-based information retrieval (IR) systems has been dominated by a textual form of information such as the title, snippet, URL, and/or file type...
Hideo Joho, Joemon M. Jose
SIGGRAPH
1994
ACM
14 years 15 days ago
Frameless rendering: double buffering considered harmful
The use of double-buffered displays, in which the previous image is displayed until the next image is complete, can impair the interactivity of systems that require tight coupling...
Gary Bishop, Henry Fuchs, Leonard McMillan, Ellen ...