Sciweavers

2135 search results - page 195 / 427
» Applications and Issues in Pen-Centric Computing
Sort
View
ICIP
2009
IEEE
13 years 6 months ago
Lamp: Linear approach for matching points
The 3D object recognition from a single or multiple 2D images is a very important problem in the computer vision field with a wide range of real applications. Considering the affi...
Manuel Marques, João Costeira
CORR
2011
Springer
216views Education» more  CORR 2011»
13 years 4 months ago
Approaches to Formal Verification of Security Protocols
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional cor...
Suvansh Lal, Mohit Jain, Vikrant Chaplot
CORR
2011
Springer
167views Education» more  CORR 2011»
13 years 26 days ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
CORR
2011
Springer
214views Education» more  CORR 2011»
13 years 19 days ago
Convex Approaches to Model Wavelet Sparsity Patterns
Statistical dependencies among wavelet coefficients are commonly represented by graphical models such as hidden Markov trees (HMTs). However, in linear inverse problems such as d...
Nikhil S. Rao, Robert D. Nowak, Stephen J. Wright,...
GROUP
2003
ACM
14 years 2 months ago
Increasing workplace independence for people with cognitive disabilities by leveraging distributed cognition among caregivers an
In this paper we describe a current group configuration that is used to support people with cognitive disabilities (hereinafter referred to as “clients”) in the workplace. A c...
Stefan Carmien, Rogerio DePaula, Andrew Gorman, An...