Sciweavers

2159 search results - page 410 / 432
» C-K design theory for information systems research
Sort
View
CCS
2010
ACM
13 years 5 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
CVIU
2007
137views more  CVIU 2007»
13 years 8 months ago
Visual learning of texture descriptors for facial expression recognition in thermal imagery
Facial expression recognition is an active research area that finds a potential application in human emotion analysis. This work presents an illumination independent approach for...
Benjamín Hernández, Gustavo Olague, ...
CHI
2005
ACM
14 years 9 months ago
Children's and adults' multimodal interaction with 2D conversational agents
Few systems combine both Embodied Conversational Agents (ECAs) and multimodal input. This research aims at modeling the behavior of adults and children during their multimodal int...
Jean-Claude Martin, Stéphanie Buisine
CCS
2009
ACM
14 years 3 months ago
Large-scale malware indexing using function-call graphs
A major challenge of the anti-virus (AV) industry is how to effectively process the huge influx of malware samples they receive every day. One possible solution to this problem i...
Xin Hu, Tzi-cker Chiueh, Kang G. Shin
SOUPS
2006
ACM
14 years 2 months ago
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
Today organizations do not have good ways of linking their written privacy policies with the implementation of those policies. To assist organizations in addressing this issue, ou...
Carolyn Brodie, Clare-Marie Karat, John Karat