Sciweavers

1765 search results - page 321 / 353
» Combinations of Weak Classifiers
Sort
View
ASIACRYPT
2000
Springer
14 years 1 months ago
Cryptanalysis of the TTM Cryptosystem
Abstract. In 1985 Fell and Diffie proposed constructing trapdoor functions with multivariate equations [11]. They used several sequentially solved stages. Another idea of building ...
Louis Goubin, Nicolas Courtois
SIGDOC
1997
ACM
14 years 25 days ago
Usability Studies of WWW Sites: Heuristic Evaluation vs. Laboratory Testing
This paper describes the strengths and weaknesses of two usability assessment methods frequently applied to web sites. It uses case histories of WWW usability studies conducted by...
Laurie Kantner, Stephanie Rosenbaum
CHI
1993
ACM
14 years 23 days ago
An evaluation of earcons for use in auditory human-computer interfaces
An evaluation of earcons was carried out to see whether they are an effective means of communicating information in sound. An initial experiment showed that earcons were better th...
Stephen A. Brewster, Peter C. Wright, Alistair D. ...
SOUPS
2010
ACM
14 years 16 days ago
Usably secure, low-cost authentication for mobile banking
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
Saurabh Panjwani, Edward Cutrell
GECCO
2007
Springer
258views Optimization» more  GECCO 2007»
14 years 16 days ago
TFBS identification by position- and consensus-led genetic algorithm with local filtering
Identification of Transcription Factor Binding Site (TFBS) motifs in multiple DNA upstream sequences is important in understanding the mechanism of gene regulation. This identific...
Tak-Ming Chan, Kwong-Sak Leung, Kin-Hong Lee