Sciweavers

485 search results - page 43 / 97
» Continuous Spatial Authentication
Sort
View
SIGCOMM
2010
ACM
13 years 8 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
ETS
2000
IEEE
126views Hardware» more  ETS 2000»
13 years 7 months ago
Dynamic Goal-Based Role-Play Simulation on the Web: A Case Study
This paper outlines and discusses the pedagogical approach, the technical design architecture, and an innovative implementation of a collaborative role-play simulation technology ...
Som Naidu, Albert Ip, Roni Linser
JMLR
2010
150views more  JMLR 2010»
13 years 2 months ago
Approximate parameter inference in a stochastic reaction-diffusion model
We present an approximate inference approach to parameter estimation in a spatio-temporal stochastic process of the reaction-diffusion type. The continuous space limit of an infer...
Andreas Ruttor, Manfred Opper
WMCSA
2008
IEEE
14 years 2 months ago
Location-based trust for mobile user-generated content: applications, challenges and implementations
The recent explosion in shared media content and sensed data produced by mobile end-users is challenging well-established principles and assumptions in data trust models. A fundam...
Vincent Lenders, Emmanouil Koukoumidis, Pei Zhang,...
ICIAP
1999
ACM
14 years 6 min ago
Facial Expression Morphing and Animation with Local Warping Methods
In this paper, we applied local warping techniques to construct a frame work of image-based morphing for facial expressions animation with low complexity. From the experience we o...
Daw-Tung Lin, Han Huang