Sciweavers

671 search results - page 51 / 135
» On Observing and Constraining Active Systems
Sort
View
PERCOM
2007
ACM
14 years 9 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
SIGIR
1996
ACM
14 years 1 months ago
Evaluating User Interfaces to Information Retrieval Systems: A Case Study on User Support
Designing good user interfaces to information retrieval systems is a complex activity. The design space is large and evaluation methodologies that go beyond the classical precisio...
Giorgio Brajnik, Stefano Mizzaro, Carlo Tasso
MTA
2008
150views more  MTA 2008»
13 years 9 months ago
Evaluation and monitoring of video quality for UMA enabled video streaming systems
This paper1 deals with monitoring user perception of multimedia presentations in a Universal Multimedia Access (UMA) enabled system using objective no-reference (NR) metrics. Thes...
R. Venkatesh Babu, Andrew Perkis, Odd Inge Hillest...
ECIS
2004
13 years 11 months ago
Failures of reward-driven behaviour in industry: a case of systems, management and creativity
Creativity is a much needed quality in today's business and therefore an important research area. Whilst implementing and evaluating computer support for electronic brainstor...
Dick Stenmark
ICCV
2003
IEEE
14 years 11 months ago
Machine Learning and Multiscale Methods in the Identification of Bivalve Larvae
This paper describes a novel application of support vector machines and multiscale texture and color invariants to a problem in biological oceanography: the identification of 6 sp...
Sanjay Tiwari, Scott Gallager