Sciweavers

2334 search results - page 163 / 467
» How are Real Grids Used
Sort
View
IJACT
2008
101views more  IJACT 2008»
13 years 10 months ago
Practical key-recovery attack against APOP, an MD5-based challenge-response authentication
Abstract: Hash functions are used in many cryptographic constructions under various assumptions, and the practical impact of collision attacks is often unclear. In this paper, we s...
Gaëtan Leurent
AAI
2005
113views more  AAI 2005»
13 years 10 months ago
Analysis and Synthesis of Learning Agent's Communicative Behavior
This paper is about people. It is about understanding how learning and communication mutually influence one another; allowing people to infer each other's communicative behavi...
Nik Nailah Binti Abdullah, Stefano A. Cerri
ECCV
1994
Springer
15 years 19 days ago
Utilizing symmetry in the reconstruction of three-dimensional shape from noisy images
In previous applications, bilateral symmetry of objects was used either as a descriptive feature in domains such as recognition and grasping, or as a way to reduce the complexity o...
Hagit Zabrodsky, Daphna Weinshall
IV
2003
IEEE
118views Visualization» more  IV 2003»
14 years 4 months ago
Mental Representations and Visualization Processes in Organizational Memories
Visual metaphors describe cognitive processes in every part of life and function as a connection between what we see and what we think. Mental activities and perceptional interact...
Stefan Smolnik, Ludwig Nastansky, Torsten Knieps
ISMAR
2009
IEEE
14 years 5 months ago
Using AR to support cross-organisational collaboration in dynamic tasks
This paper presents a study where Augmented Reality (AR) technology has been used as a tool for supporting collaboration between the rescue services, the police and military perso...
Susanna Nilsson, Björn J. E. Johansson, Arne ...