Sciweavers

583 search results - page 71 / 117
» Finding Answers to Complex Questions
Sort
View
ACSAC
2005
IEEE
14 years 3 months ago
Graphical Passwords: A Survey
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend ...
Xiaoyuan Suo, Ying Zhu, G. Scott Owen
GROUP
2005
ACM
14 years 3 months ago
Searching for expertise in social networks: a simulation of potential strategies
People search for people with suitable expertise all of the time in their social networks – to answer questions or provide help. Recently, efforts have been made to augment this...
Jun Zhang, Mark S. Ackerman
HICSS
2003
IEEE
129views Biometrics» more  HICSS 2003»
14 years 3 months ago
Towards an Ontology for e-Document Management in Public Administration - the Case of Schleswig-Holstein
An action research project in the state administration of Schleswig-Holstein (Germany) seeks to answer the following questions: How can we organize and present edocuments so that ...
Ralf Klischewski
TOOLS
1999
IEEE
14 years 2 months ago
Cooperative Software Development: Concepts, Model and Tools
The development of large software systems demands intensive cooperation among multiple project team members with different responsibilities. The development process is often distr...
Josef Altmann, Gustav Pomberger
ASIACRYPT
2006
Springer
14 years 1 months ago
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensively studied in the literature over the last 25 years. These generators have the a...
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang