Sciweavers

4201 search results - page 156 / 841
» Our Users have Root!
Sort
View
FC
2005
Springer
98views Cryptology» more  FC 2005»
14 years 1 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...
ACMDIS
2008
ACM
13 years 10 months ago
TapGlance: designing a unified smartphone interface
The difference between using one mobile phone and another can feel like learning a new language based on our extensive experience designing mobile applications for spatial data na...
Daniel C. Robbins, Bongshin Lee, Roland Fernandez
AAAI
2004
13 years 9 months ago
High-Level Goal Recognition in a Wireless LAN
Plan recognition has traditionally been developed for logically encoded application domains with a focus on logical reasoning. In this paper, we present an integrated plan-recogni...
Jie Yin, Xiaoyong Chai, Qiang Yang
CP
2008
Springer
13 years 10 months ago
Elicitation Strategies for Fuzzy Constraint Problems with Missing Preferences: Algorithms and Experimental Studies
Fuzzy constraints are a popular approach to handle preferences and over-constrained problems in scenarios where one needs to be cautious, such as in medical or space applications. ...
Mirco Gelain, Maria Silvia Pini, Francesca Rossi, ...
AVI
2010
13 years 5 months ago
An infrastructure for creating graphical indicators of the learner profile by mashing up different sources
The procedures to collect information about users are well known in computer science till long time. They range from getting explicit information from users, required in order to ...
Luca Mazzola, Riccardo Mazza