Sciweavers

380 search results - page 74 / 76
» Are Your Rules Online
Sort
View
SOUPS
2010
ACM
14 years 1 months ago
Where do security policies come from?
We examine the password policies of 75 different websites. Our goal is understand the enormous diversity of requirements: some will accept simple six-character passwords, while o...
Dinei A. F. Florêncio, Cormac Herley
DATE
2004
IEEE
145views Hardware» more  DATE 2004»
14 years 1 months ago
Hierarchical Adaptive Dynamic Power Management
Dynamic power management aims at extending battery life by switching devices to lower-power modes when there is a reduced demand for service. Static power management strategies can...
Zhiyuan Ren, Bruce H. Krogh, Radu Marculescu
CVDB
2005
ACM
13 years 11 months ago
Optimizing progressive query-by-example over pre-clustered large image databases
The typical mode for querying in an image content-based information system is query-by-example, which allows the user to provide an image as a query and to search for similar imag...
Anicet Kouomou Choupo, Laure Berti-Equille, Annie ...
IWEC
2008
13 years 11 months ago
Game Bot Detection Based on Avatar Trajectory
In recent years, online gaming has become one of the most popular Internet activities, but cheating activity, such as the use of game bots, has increased as a consequence. Generall...
Kuan-Ta Chen, Andrew Liao, Hsing-Kuo Kenneth Pao, ...
ESANN
2006
13 years 11 months ago
Magnification control for batch neural gas
Neural gas (NG) constitutes a very robust clustering algorithm which can be derived as stochastic gradient descent from a cost function closely connected to the quantization error...
Barbara Hammer, Alexander Hasenfuss, Thomas Villma...