Sciweavers

1018 search results - page 165 / 204
» Remote User Authentication Using Public Information
Sort
View
BMCBI
2006
139views more  BMCBI 2006»
13 years 8 months ago
Integrated functional visualization of eukaryotic genomes
Background: Increasing amounts of data from large scale whole genome analysis efforts demands convenient tools for manipulation, visualization and investigation. Whole genome plot...
Rohit Ghai, Hannes Lindemann, Trinad Chakraborty
SP
2007
IEEE
14 years 2 months ago
The Emperor's New Security Indicators
We evaluate website authentication measures that are designed to protect users from man-in-the-middle, ‘phishing’, and other site forgery attacks. We asked 67 bank customers t...
Stuart E. Schechter, Rachna Dhamija, Andy Ozment, ...
CORR
2010
Springer
189views Education» more  CORR 2010»
13 years 7 months ago
An Optimal Dynamic Mechanism for Multi-Armed Bandit Processes
We consider the problem of revenue-optimal dynamic mechanism design in settings where agents' types evolve over time as a function of their (both public and private) experien...
Sham M. Kakade, Ilan Lobel, Hamid Nazerzadeh
CIKM
2004
Springer
14 years 1 months ago
Local methods for estimating pagerank values
The Google search engine uses a method called PageRank, together with term-based and other ranking techniques, to order search results returned to the user. PageRank uses link ana...
Yen-Yu Chen, Qingqing Gan, Torsten Suel
MM
2005
ACM
129views Multimedia» more  MM 2005»
14 years 1 months ago
The "control of fear": an interactive art experiencing and presenting system with multimodal sensors and media
The “Control of Fear” project is an interactive art exhibition project to provide the general public an opportunity to experience what might occur to them if their lives were ...
Chin Chih Yang, Lipin Liu, Jacy Chen