Sciweavers

4905 search results - page 881 / 981
» Aging and Human Performance
Sort
View
FC
2006
Springer
129views Cryptology» more  FC 2006»
15 years 8 months ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig
ICSE
2000
IEEE-ACM
15 years 7 months ago
Little-JIL/Juliette: a process definition language and interpreter
Little-JIL, a language for programming coordination in processes is an executable, high-level language with a formal (yet graphical) syntax and rigorously defined operational seTh...
Aaron G. Cass, Barbara Staudt Lerner, Stanley M. S...
LCTRTS
2000
Springer
15 years 7 months ago
Approximation of Worst-Case Execution Time for Preemptive Multitasking Systems
The control system of many complex mechatronic products requires for each task the Worst Case Execution Time (WCET), which is needed for the scheduler's admission tests and su...
Matteo Corti, Roberto Brega, Thomas R. Gross
157
Voted
CVPR
2010
IEEE
15 years 7 months ago
Discriminative K-SVD for Dictionary Learning in Face Recognition
In a sparse-representation-based face recognition scheme, the desired dictionary should have good representational power (i.e., being able to span the subspace of all faces) while...
Qiang Zhang, Baoxin Li
GROUP
2009
ACM
15 years 7 months ago
GroupMind: supporting idea generation through a collaborative mind-mapping tool
Collaborative brainstorming can be a challenging but important part of creative group problem solving. Mind-mapping has the potential to enhance the brainstorming process but has ...
Patrick C. Shih, David H. Nguyen, Sen H. Hirano, D...