Sciweavers

4370 search results - page 824 / 874
» Brain Organization and Computation
Sort
View
CCS
2005
ACM
15 years 10 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
COCOON
2005
Springer
15 years 10 months ago
RIATA-HGT: A Fast and Accurate Heuristic for Reconstructing Horizontal Gene Transfer
Horizontal gene transfer (HGT) plays a major role in microbial genome diversification, and is claimed to be rampant among various groups of genes in bacteria. Further, HGT is a ma...
Luay Nakhleh, Derek A. Ruths, Li-San Wang
EPIA
2005
Springer
15 years 10 months ago
Visual Based Human Motion Analysis: Mapping Gestures Using a Puppet Model
Abstract. This paper presents a novel approach to analyze the appearance of human motions with a simple model i.e. mapping the motions using a virtual marionette model. The approac...
Jörg Rett, Jorge Dias
ICMI
2005
Springer
162views Biometrics» more  ICMI 2005»
15 years 10 months ago
Distributed pointing for multimodal collaboration over sketched diagrams
A problem faced by groups that are not co-located but need to collaborate on a common task is the reduced access to the rich multimodal communicative context that they would have ...
Paulo Barthelmess, Edward C. Kaiser, Xiao Huang, D...
ASPLOS
2004
ACM
15 years 10 months ago
Devirtualizable virtual machines enabling general, single-node, online maintenance
Maintenance is the dominant source of downtime at high availability sites. Unfortunately, the dominant mechanism for reducing this downtime, cluster rolling upgrade, has two short...
David E. Lowell, Yasushi Saito, Eileen J. Samberg