Sciweavers

8496 search results - page 1635 / 1700
» Problem Solving and Complex Systems
Sort
View
NDSS
2007
IEEE
14 years 2 months ago
Secret Handshakes with Dynamic and Fuzzy Matching
The need for communication privacy over public networks is of growing concern in today’s society. As a result, privacy-preserving authentication and key exchange protocols have ...
Giuseppe Ateniese, Jonathan Kirsch, Marina Blanton
AIED
2007
Springer
14 years 2 months ago
Can Help Seeking Be Tutored? Searching for the Secret Sauce of Metacognitive Tutoring
In our on-going endeavor to teach students better help-seeking skills we designed a three-pronged Help-Seeking Support Environment that includes (a) classroom instruction (b) a Sel...
Ido Roll, Vincent Aleven, Bruce M. McLaren, Kennet...
FSKD
2007
Springer
193views Fuzzy Logic» more  FSKD 2007»
14 years 2 months ago
Panoramic Background Model under Free Moving Camera
segmentation of moving regions in outdoor environment under a moving camera is a fundamental step in many vision systems including automated visual surveillance, human-machine int...
Naveed I. Rao, Huijun Di, Guangyou Xu
GECCO
2007
Springer
177views Optimization» more  GECCO 2007»
14 years 2 months ago
Takeover times on scale-free topologies
The topological properties of a network directly impact the flow of information through a system. In evolving populations, the topology of inter-individual interactions affects th...
Joshua L. Payne, Margaret J. Eppstein
SKG
2006
IEEE
14 years 1 months ago
Security Attack Ontology for Web Services
Web services (WS) have become a significant part of the Web because of such attractive features as simple to use, platform independence, and XML/SOAP support. However, these featu...
Artem Vorobiev, Jun Han
« Prev « First page 1635 / 1700 Last » Next »