Sciweavers

5232 search results - page 1040 / 1047
» Generative modeling: a symbolic system for geometric modelin...
Sort
View
JCDL
2005
ACM
95views Education» more  JCDL 2005»
14 years 1 months ago
Resolving the unencoded character problem for chinese digital libraries
Constructing a Chinese digital library, especially for a historical article archiving, is often bothered by the small character sets supported by the current computer systems. Thi...
Derming Juang, Jenq-Haur Wang, Chen-Yu Lai, Ching-...
SOUPS
2005
ACM
14 years 1 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar
BIBE
2003
IEEE
133views Bioinformatics» more  BIBE 2003»
14 years 22 days ago
A Computational Pipeline for Protein Structure Prediction and Analysis at Genome Scale
The tertiary (3D) structure of a protein contains the essential information for understanding the biological function of the protein at the molecular and cellular levels. Traditio...
Manesh J. Shah, Sergei Passovets, Dongsup Kim, Kyl...
IV
2003
IEEE
200views Visualization» more  IV 2003»
14 years 22 days ago
Artist As Researcher, Understanding The Tools
The paper begins with a response to the nature of contemporary artists relationships to how computers have permeated the fine art domain and how they affect the creative process. ...
Theresa Gartland-Jones
NDSS
2003
IEEE
14 years 21 days ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
« Prev « First page 1040 / 1047 Last » Next »