Sciweavers

1018 search results - page 105 / 204
» Remote User Authentication Using Public Information
Sort
View
ECTEL
2010
Springer
13 years 8 months ago
Ambient Displays and Game Design Patterns
In this paper we describe a social learning game we implemented to evaluate various means of ubiquitous learning support. Making use of game design patterns it was possible to impl...
Sebastian Kelle, Dirk Börner, Marco Kalz, Mar...
SIMPRA
2008
131views more  SIMPRA 2008»
13 years 8 months ago
Distributed simulation of DEVS and Cell-DEVS models in CD++ using Web-Services
: DEVS is a Modeling and Simulation formalism that has been widely used to study the dynamics of discrete event systems. Cell-DEVS is a DEVS-based formalism that defines spatial mo...
Gabriel A. Wainer, Rami Madhoun, Khaldoon Al-Zoubi
KDD
2007
ACM
154views Data Mining» more  KDD 2007»
14 years 8 months ago
Canonicalization of database records using adaptive similarity measures
It is becoming increasingly common to construct databases from information automatically culled from many heterogeneous sources. For example, a research publication database can b...
Aron Culotta, Michael L. Wick, Robert Hall, Matthe...
AIMSA
2004
Springer
14 years 1 months ago
PubMiner: Machine Learning-Based Text Mining System for Biomedical Information Mining
PubMiner, an intelligent machine learning based text mining system for mining biological information from the literature is introduced. PubMiner utilize natural language processing...
Jae-Hong Eom, Byoung-Tak Zhang
TCC
2007
Springer
93views Cryptology» more  TCC 2007»
14 years 2 months ago
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
Abstract. We construct an intrusion-resilient symmetric-key authenticated key exchange (AKE) protocol in the bounded retrieval model. The model employs a long shared private key to...
David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke L...