Sciweavers

3906 search results - page 748 / 782
» From grids to places
Sort
View
ATC
2006
Springer
14 years 1 months ago
Ubisafe Computing: Vision and Challenges (I)
In recent years, a variety of new computing paradigms have been proposed for various purposes. It is true that many of them intend to and really can gratify some of the people some...
Jianhua Ma, Qiangfu Zhao, Vipin Chaudhary, Jingde ...
AUSAI
2006
Springer
14 years 1 months ago
Turkish Fingerspelling Recognition System Using Axis of Least Inertia Based Fast Alignment
Fingerspelling is used in sign language to spell out names of people and places for which there is no sign or for which the sign is not known. In this work we describe a Turkish fi...
Oguz Altun, Songül Albayrak, Ali Ekinci, Behz...
CCS
2006
ACM
14 years 1 months ago
TCG inside?: a note on TPM specification compliance
The Trusted Computing Group (TCG) has addressed a new generation of computing platforms employing both supplemental hardware and software with the primary goal to improve the secu...
Ahmad-Reza Sadeghi, Marcel Selhorst, Christian St&...
CIVR
2006
Springer
189views Image Analysis» more  CIVR 2006»
14 years 1 months ago
Automatic Person Annotation of Family Photo Album
Digital photographs are replacing tradition films in our daily life and the quantity is exploding. This stimulates the strong need for efficient management tools, in which the anno...
Ming Zhao 0003, Yong Teo, Siliang Liu, Tat-Seng Ch...
FC
2006
Springer
129views Cryptology» more  FC 2006»
14 years 1 months ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig