Sciweavers

2604 search results - page 188 / 521
» Human Errors and System Requirements
Sort
View
CHI
2009
ACM
14 years 4 months ago
Vibrapass: secure authentication based on shared lies
Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on reco...
Alexander De Luca, Emanuel von Zezschwitz, Heinric...
ICASSP
2008
IEEE
14 years 3 months ago
Impact of automatic sentence segmentation on meeting summarization
This paper investigates the impact of automatic sentence segmentation on speech summarization using the ICSI meeting corpus. We use a hidden Markov model (HMM) for sentence segmen...
Yang Liu, Shasha Xie
USS
2010
13 years 7 months ago
VEX: Vetting Browser Extensions for Security Vulnerabilities
The browser has become the de facto platform for everyday computation. Among the many potential attacks that target or exploit browsers, vulnerabilities in browser extensions have...
Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, ...
HUC
2011
Springer
12 years 9 months ago
HeatProbe: a thermal-based power meter for accounting disaggregated electricity usage
To promote energy-saving behavior, disaggregating electricity usage is critical for increasing consumer awareness of energy usage behavior. This study proposes HeatProbe, a therma...
Bo-Jhang Ho, Hsin-Liu Cindy Kao, Nan-Chen Chen, Ch...
SMI
2003
IEEE
223views Image Analysis» more  SMI 2003»
14 years 2 months ago
Skeleton Extraction of 3D Objects with Radial Basis Functions
Skeleton is a lower dimensional shape description of an object. The requirements of a skeleton differ with applications. For example, object recognition requires skeletons with pr...
Wan-Chun Ma, Fu-Che Wu, Ming Ouhyoung