Sciweavers

954 search results - page 136 / 191
» Principles and Models for Organizing the IT Function
Sort
View
IUI
2010
ACM
14 years 2 months ago
Usability guided key-target resizing for soft keyboards
Soft keyboards offer touch-capable mobile and tabletop devices many advantages such as multiple language support and space for larger graphical displays. On the other hand, becaus...
Asela Gunawardana, Tim Paek, Christopher Meek
ESORICS
2007
Springer
14 years 1 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
HICSS
2002
IEEE
71views Biometrics» more  HICSS 2002»
14 years 20 days ago
Source Code Generator Based on a Proprietary Specification Language
An application generator has resulted from the authors' efforts to improve the development of interactive database applications. The developed tool is based on a meta-base. T...
Kresimir Fertalj, Damir Kalpic, Vedran Mornar
TNN
2010
234views Management» more  TNN 2010»
13 years 2 months ago
Novel maximum-margin training algorithms for supervised neural networks
This paper proposes three novel training methods, two of them based on the back-propagation approach and a third one based on information theory for Multilayer Perceptron (MLP) bin...
Oswaldo Ludwig, Urbano Nunes
WSC
2000
13 years 9 months ago
Circumstance descriptors: a method for generating plan modifications and fragmentary orders
Circumstance Descriptors are offered as a way to organize spatial and other military knowledge that may be difficult to formulate, particularly the kinds of details that are most ...
John B. Gilmer Jr.