Sciweavers

756 search results - page 12 / 152
» Leveraging the CAPTCHA Problem
Sort
View
ACMICEC
2007
ACM
102views ECommerce» more  ACMICEC 2007»
14 years 25 days ago
Security when people matter: structuring incentives for user behavior
Humans are "smart components" in a system, but cannot be directly programmed to perform; rather, their autonomy must be respected as a design constraint and incentives p...
Rick Wash, Jeffrey K. MacKie-Mason
CRYPTO
2007
Springer
145views Cryptology» more  CRYPTO 2007»
14 years 3 months ago
Chernoff-Type Direct Product Theorems
Consider a challenge-response protocol where the probability of a correct response is at least α for a legitimate user and at most β < α for an attacker. One example is a CAP...
Russell Impagliazzo, Ragesh Jaiswal, Valentine Kab...
ECCV
2010
Springer
14 years 2 months ago
Word Spotting in the Wild
We present a method for spotting words in the wild, i.e., in real images taken in unconstrained environments. Text found in the wild has a surprising range of difficulty. At one en...
IJCAI
2007
13 years 10 months ago
On Modeling Multiagent Task Scheduling as a Distributed Constraint Optimization Problem
This paper investigates how to represent and solve multiagent task scheduling as a Distributed Constraint Optimization Problem (DCOP). Recently multiagent researchers have adopted...
Evan Sultanik, Pragnesh Jay Modi, William C. Regli
VLDB
2004
ACM
125views Database» more  VLDB 2004»
14 years 2 months ago
From XML View Updates to Relational View Updates: old solutions to a new problem
This paper addresses the question of updating relational databases through XML views. Using query trees to capture the notions of selection, projection, nesting, grouping, and het...
Vanessa P. Braganholo, Susan B. Davidson, Carlos A...