Sciweavers

1029 search results - page 169 / 206
» Improving User Satisfaction in a Ubiquitous Computing Applic...
Sort
View
CCS
2009
ACM
14 years 11 days ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
CVPR
2005
IEEE
14 years 9 months ago
Multi-Output Regularized Projection
Dimensionality reduction via feature projection has been widely used in pattern recognition and machine learning. It is often beneficial to derive the projections not only based o...
Kai Yu, Shipeng Yu, Volker Tresp
ADHOCNETS
2009
Springer
14 years 2 months ago
Cooperative Localization in GPS-Limited Urban Environments
Abstract. Existing localization techniques such as GPS have fundamental limitations which preclude deployment in urban canyons or areas with inconsistent network availability. Augm...
Jeffrey Hemmes, Douglas Thain, Christian Poellabau...
AGILE
2007
Springer
127views GIS» more  AGILE 2007»
14 years 1 months ago
Space-contained conflict revision, for geographic information
Using qualitative reasoning with geographic information, contrarily, for instance, with robotics, looks not only fastidious (i.e.: encoding knowledge Propositional Logics PL), but ...
Omar Doukari, Robert Jeansoulin
ICCSA
2010
Springer
14 years 26 days ago
ISATEM: An Integration of Socioeconomic and Spatial Models for Mineral Resources Exploitation
In the spatial-integrated socioeconomic model field, a multi-agent approach is appropriate for supporting applications modelled at a detailed territory scale, but it is less used t...
Fenintsoa Andriamasinoro, Daniel Cassard, Bruno Ma...