Sciweavers

247 search results - page 37 / 50
» Session-Key Generation Using Human Passwords Only
Sort
View
123
Voted
ITNG
2008
IEEE
15 years 9 months ago
Towards a Specification Prototype for Hierarchy-Driven Attack Patterns
We propose the characteristics of a software tool that leverages specifying attack pattern details in understandable hierarchies. These hierarchies are currently manually populate...
Joshua J. Pauli, Patrick Henry Engebretson
130
Voted
IUI
2003
ACM
15 years 7 months ago
Scripting embodied agents behaviour with CML: character markup language
Embodied agents present ongoing challenging agenda for research in multi-modal user interfaces and humancomputer-interaction. Such agent metaphors will only be widely applicable t...
Yasmine Arafa, E. H. Mamdani
177
Voted
TMM
2010
249views Management» more  TMM 2010»
14 years 9 months ago
Bridging the Semantic Gap Between Image Contents and Tags
With the exponential growth of Web 2.0 applications, tags have been used extensively to describe the image contents on the Web. Due to the noisy and sparse nature in the human gene...
Hao Ma, Jianke Zhu, Michael R. Lyu, Irwin King
CLEF
2005
Springer
15 years 8 months ago
Pitt at CLEF05: Data Fusion for Spoken Document Retrieval
Abstract. This paper describes an investigation of data fusion techniques for spoken document retrieval. The effectiveness of retrievals solely based on the outputs from automatic...
Daqing He, Jae-wook Ahn
CVPR
2003
IEEE
16 years 4 months ago
Face Relighting with Radiance Environment Maps
A radiance environment map pre-integrates a constant surface reflectance with the lighting environment. It has been used to generate photo-realistic rendering at interactive speed...
Zhen Wen, Zicheng Liu, Thomas S. Huang