Sciweavers

780 search results - page 87 / 156
» Introduction to Special Issue
Sort
View
CCS
2007
ACM
14 years 3 months ago
Beamauth: two-factor web authentication with a bookmark
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
Ben Adida
FPGA
2007
ACM
185views FPGA» more  FPGA 2007»
14 years 3 months ago
Power-aware FPGA logic synthesis using binary decision diagrams
Power consumption in field programmable gate arrays (FPGAs) has become an important issue as the FPGA market has grown to include mobile platforms. In this work we present a power...
Kevin Oo Tinmaung, David Howland, Russell Tessier
GECCO
2007
Springer
154views Optimization» more  GECCO 2007»
14 years 3 months ago
Cross entropy and adaptive variance scaling in continuous EDA
This paper deals with the adaptive variance scaling issue in continuous Estimation of Distribution Algorithms. A phenomenon is discovered that current adaptive variance scaling me...
Yunpeng Cai, Xiaomin Sun, Hua Xu, Peifa Jia
IH
2007
Springer
14 years 3 months ago
Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation
The recent decade has seen the emergence of 3D meshes in industrial, medical and entertainment applications. Therefore, their intellectual property protection problem has attracted...
Kai Wang, Guillaume Lavoué, Florence Denis,...
OTM
2007
Springer
14 years 3 months ago
Spontaneous Privacy Policy Negotiations in Pervasive Environments
Abstract. Privacy issues are a major burden for the acceptance of pervasive applications. They may ultimately result in the rejection of new services despite their functional beneï...
Sören Preibusch