Sciweavers

773 search results - page 20 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
CHI
2009
ACM
14 years 10 months ago
Reduced empathizing skills increase challenges for user-centered design
User-Centered Design is surprisingly difficult. One of the biggest issues, certainly for those with no HCI or usability experience, is a lack of appreciation of how users think an...
William Hudson
DAWAK
2007
Springer
14 years 3 months ago
OLAP Technology for Business Process Intelligence: Challenges and Solutions
The emerging area of business process intelligence aims at enhancing the analysis power of business process management systems by employing data warehousing and mining technologies...
Svetlana Mansmann, Thomas Neumuth, Marc H. Scholl
CORR
2010
Springer
138views Education» more  CORR 2010»
13 years 9 months ago
Data Stream Clustering: Challenges and Issues
Very large databases are required to store massive amounts of data that are continuously inserted and queried. Analyzing huge data sets and extracting valuable pattern in many appl...
Madjid Khalilian, Norwati Mustapha
SCALESPACE
2007
Springer
14 years 3 months ago
Detecting Regions of Dynamic Texture
Abstract. Motion estimation is usually based on the brightness constancy assumption. This assumption holds well for rigid objects with a Lambertian surface, but it is less appropri...
Tomer Amiaz, Sándor Fazekas, Dmitry Chetver...
CCS
2010
ACM
13 years 6 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...