Sciweavers

2702 search results - page 344 / 541
» Message from the Editor
Sort
View
CVPR
2005
IEEE
16 years 6 months ago
Restoration and Recognition in a Loop
In this paper we present a novel learning based method for restoring and recognizing images of digits that have been blurred using an unknown kernel. The novelty of our work is an...
Mithun Das Gupta, ShyamSundar Rajaram, Nemanja Pet...
PERCOM
2008
ACM
16 years 3 months ago
Towards Robust Low Cost Authentication for Pervasive Devices
Low cost devices such as RFIDs, sensor network nodes, and smartcards are crucial for building the next generation pervasive and ubiquitous networks. The inherent power and footpri...
Erdinç Öztürk, Ghaith Hammouri, B...
DCC
2004
IEEE
16 years 3 months ago
Length-Limited Variable-to-Variable Length Codes For High-Performance Entropy Coding
Arithmetic coding achieves a superior coding rate when encoding a binary source, but its lack of speed makes it an inferior choice when true high? performance encoding is needed. ...
Joshua G. Senecal, Mark A. Duchaineau, Kenneth I. ...
SAC
2010
ACM
15 years 11 months ago
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
CAPTCHAs protect online resources and services from automated access. From an attacker’s point of view, they are typically perceived as an annoyance that prevents the mass creat...
Manuel Egele, Leyla Bilge, Engin Kirda, Christophe...
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
15 years 11 months ago
Mycrocosm: Visual Microblogging
This paper introduces Mycrocosm, a microblogging site in which users communicate via statistical graphics, rather than the usual short text statements. Users of Mycrocosm can reco...
Yannick Assogba, Judith S. Donath