Sciweavers

8697 search results - page 1726 / 1740
» An Approach to the Enterprise Integration
Sort
View
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
13 years 5 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
ICIP
2010
IEEE
13 years 5 months ago
Streaming Compressive Sensing for high-speed periodic videos
The ability of Compressive Sensing (CS) to recover sparse signals from limited measurements has been recently exploited in computational imaging to acquire high-speed periodic and...
M. Salman Asif, Dikpal Reddy, Petros Boufounos, As...
SECON
2010
IEEE
13 years 5 months ago
Tones for Real: Managing Multipath in Underwater Acoustic Wakeup
The principles of sensor networks--low-power, wireless, in-situ sensing with many inexpensive sensors--are only recently penetrating into underwater research. Acoustic communicati...
Affan A. Syed, John S. Heidemann, Wei Ye
UIST
2010
ACM
13 years 5 months ago
Multitoe: high-precision interaction with back-projected floors based on high-resolution multi-touch input
Tabletop applications cannot display more than a few dozen on-screen objects. The reason is their limited size: tables cannot become larger than arm's length without giving u...
Thomas Augsten, Konstantin Kaefer, René Meu...
WINE
2010
Springer
189views Economy» more  WINE 2010»
13 years 5 months ago
Approximation Algorithms for Non-single-minded Profit-Maximization Problems with Limited Supply
We consider profit-maximization problems for combinatorial auctions with non-single minded valuation functions and limited supply. We obtain fairly general results that relate the ...
Khaled M. Elbassioni, Mahmoud Fouz, Chaitanya Swam...
« Prev « First page 1726 / 1740 Last » Next »