Sciweavers

114 search results - page 11 / 23
» Evaluation of a location-linked notes system
Sort
View
VIROLOGY
2010
165views more  VIROLOGY 2010»
13 years 5 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...
ICASSP
2011
IEEE
13 years 2 months ago
User verification: Matching the uploaders of videos across accounts
This article presents an attempt to link the uploaders of videos based on the audio track of the videos. Using a subset of the MediaEval [10] Placing Task’s Flickr video set, wh...
Howard Lei, Jaeyoung Choi, Adam Janin, Gerald Frie...
MOBISYS
2011
ACM
13 years 1 months ago
Using mobile phones to write in air
The ability to note down small pieces of information, quickly and easily, can be useful. This paper proposes a system called PhonePoint Pen that uses the in-built accelerometer in...
Sandip Agrawal, Ionut Constandache, Shravan Gaonka...
AES
2004
Springer
135views Cryptology» more  AES 2004»
14 years 4 months ago
Some Algebraic Aspects of the Advanced Encryption Standard
Abstract. Since being officially selected as the new Advanced Encryption Standard (AES), Rijndael has continued to receive great attention and has had its security continuously eva...
Carlos Cid
CHI
2006
ACM
14 years 23 days ago
Shaping user input in speech graffiti: a first pass
Speech Graffiti is a standardized interaction protocol for spoken dialog systems designed to address some common difficulties with ASR. We have proposed a strategy of shaping to h...
Stefanie Tomko, Roni Rosenfeld