Sciweavers

1917 search results - page 290 / 384
» Decisions under subjective information
Sort
View
CCS
2008
ACM
13 years 12 months ago
Mutual authentication in RFID: security and privacy
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...
Radu-Ioan Paise, Serge Vaudenay
BCSHCI
2007
13 years 11 months ago
Agile human-centered software engineering
We seek to close the gap between software engineering (SE) and human-computer interaction (HCI) by indicating interdisciplinary interfaces throughout the different phases of SE an...
Thomas Memmel, Fredrik Gundelsweiler, Harald Reite...
BCSHCI
2008
13 years 11 months ago
User test of soccer highlights application
This paper describes an evaluation of a consumer application for soccer highlights detection, which combines advanced user interaction with an underlying automatic highlights dete...
Lu Wang, Pedro Fonseca, Bas Zoetekouw
DOCENG
2010
ACM
13 years 11 months ago
Picture detection in document page images
We present a method for picture detection in document page images, which can come from scanned or camera images, or rendered from electronic file formats. Our method uses OCR to s...
Patrick Chiu, Francine Chen, Laurent Denoue
GISCIENCE
2010
Springer
212views GIS» more  GISCIENCE 2010»
13 years 11 months ago
Qualitative Change to 3-Valued Regions
Regions which evolve over time are a significant aspect of many phenomena in geographic information science. Examples include areas in which a measured value (e.g. temperature, sal...
Matt Duckham, John G. Stell, Maria Vasardani, Mich...