Sciweavers

1663 search results - page 80 / 333
» Computer Security in the Real World
Sort
View
NETGAMES
2006
ACM
14 years 2 months ago
Metazoa Ludens
— For better or worse, technological advancement has changed the world to the extent that at a professional level demands from the working executive required more hours either in...
Roger Thomas Kok Chuen Tan, James Keng Soon Teh, A...
MCETECH
2009
Springer
14 years 3 months ago
TwoStep: An Authentication Method Combining Text and Graphical Passwords
Text-based passwords alone are subject to dictionary attacks as users tend to choose weak passwords in favor of memorability, as well as phishing attacks. Many recognition-based gr...
Paul C. van Oorschot, Tao Wan
ISI
2008
Springer
13 years 9 months ago
Visual Analytics for Supporting Entity Relationship Discovery on Text Data
To conduct content analysis over text data, one may look out for important named objects and entities that refer to real world instances, synthesizing them into knowledge relevant ...
Hanbo Dai, Ee-Peng Lim, Hady Wirawan Lauw, HweeHwa...
ICCV
2005
IEEE
14 years 10 months ago
Active Search for Real-Time Vision
In most cases when information is to be extracted from an image, there are priors available on the state of the world and therefore on the detailed measurements which will be obta...
Andrew J. Davison
SIGGRAPH
1999
ACM
14 years 1 months ago
The VolumePro Real-Time Ray-Casting System
This paper describes VolumePro, the world’s first single-chip realtime volume rendering system for consumer PCs. VolumePro implements ray-casting with parallel slice-by-slice p...
Hanspeter Pfister, Jan Hardenbergh, Jim Knittel, H...