Sciweavers

12373 search results - page 2412 / 2475
» Semi-Logarithmic Number Systems
Sort
View
ECRIME
2007
14 years 24 days ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
EENERGY
2010
14 years 23 days ago
Mobile networks unplugged
Mobile network access has seemingly become ubiquitous in industrialized countries. With data services becoming sufficiently fast, usable, and affordable, demand is growing rapidly...
Jukka Manner, Marko Luoma, Jörg Ott, Jyri H&a...
PODC
2010
ACM
14 years 23 days ago
Finding mobile data under delay constraints with searching costs
A token is hidden in one of several boxes and then the boxes are locked. The probability of placing the token in each of the boxes is known. A searcher is looking for the token by...
Amotz Bar-Noy, Panagiotis Cheilaris, Yi Feng 0002,...
SIGGRAPH
2010
ACM
14 years 23 days ago
Camera-less Smart Laser Projector
We introduce here our latest ‘smart laser projector’ prototype, i.e, a modified laser-based projector capable of augmenting all kind of surfaces while simultaneously using th...
Álvaro Cassinelli, Alexis Zerroug, Yoshihir...
SIGIR
2010
ACM
14 years 23 days ago
Extending average precision to graded relevance judgments
Evaluation metrics play a critical role both in the context of comparative evaluation of the performance of retrieval systems and in the context of learning-to-rank (LTR) as objec...
Stephen E. Robertson, Evangelos Kanoulas, Emine Yi...
« Prev « First page 2412 / 2475 Last » Next »