Sciweavers

788 search results - page 71 / 158
» Evaluating Current Testing Processes of Web-Portal Applicati...
Sort
View
SOUPS
2010
ACM
13 years 11 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
BMCBI
2005
122views more  BMCBI 2005»
13 years 7 months ago
FACT - a framework for the functional interpretation of high-throughput experiments
Background: Interpreting the results of high-throughput experiments, such as those obtained from DNA-microarrays, is an often time-consuming task due to the high number of data-po...
Felix Kokocinski, Nicolas Delhomme, Gunnar Wrobel,...
ISLPED
1999
ACM
236views Hardware» more  ISLPED 1999»
14 years 2 days ago
Modeling and automating selection of guarding techniques for datapath elements
While guarded evaluation has proven an effective energy saving technique in arithmetic circuits, good methodologies do not exist for determining when and how to guard for maximal ...
William E. Dougherty, Donald E. Thomas
ICIP
2006
IEEE
14 years 9 months ago
Extraction of Significant Video Summaries by Dendrogram Analysis
In the current video analysis scenario, effective clustering of shots facilitates the access to the content and helps in understanding the associated semantics. This paper introdu...
Sergio Benini, Aldo Bianchetti, Riccardo Leonardi,...
ADBIS
2009
Springer
140views Database» more  ADBIS 2009»
14 years 2 months ago
Optimizing Maintenance of Constraint-Based Database Caches
Abstract. Caching data reduces user-perceived latency and often enhances availability in case of server crashes or network failures. DB caching aims at local processing of declarat...
Joachim Klein 0002, Susanne Braun