Sciweavers

945 search results - page 186 / 189
» People are doing it for themselves
Sort
View
JOC
2007
133views more  JOC 2007»
13 years 10 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
TSMC
2008
147views more  TSMC 2008»
13 years 10 months ago
Tracking of Multiple Targets Using Online Learning for Reference Model Adaptation
Recently, much work has been done in multiple ob-4 ject tracking on the one hand and on reference model adaptation5 for a single-object tracker on the other side. In this paper, we...
Franz Pernkopf
AROBOTS
2004
114views more  AROBOTS 2004»
13 years 10 months ago
Integration of a Rehabilitation Robotic System (KARES II) with Human-Friendly Man-Machine Interaction Units
In this paper, we report some important results of design and evaluation of a wheelchair-based robotic arm system, named as KARES II (KAIST Rehabilitation Engineering Service Syste...
Zeungnam Bien, Myung Jin Chung, Pyung Hun Chang, D...
COMPUTER
2000
180views more  COMPUTER 2000»
13 years 10 months ago
The Challenges of Automatic Summarization
tion--the art of abstracting key content from one or more information sources--has become an integral part of everyday life. People keep abreast of world affairs by listening to ne...
Udo Hahn, Inderjeet Mani
CACM
1998
103views more  CACM 1998»
13 years 10 months ago
The Virtual Design Team
The long range goal of the “Virtual Design Team” (VDT) research program is to develop computational tools to analyze decision making and communication behavior and thereby to ...
John C. Kunz, Tore R. Christiansen, Geoff P. Cohen...