Sciweavers

796 search results - page 109 / 160
» Spoofing prevention method
Sort
View
IFM
2004
Springer
125views Formal Methods» more  IFM 2004»
14 years 3 months ago
Formally Justifying User-Centred Design Rules: A Case Study on Post-completion Errors
Abstract. Interactive systems combine a human operator with a computer. Either may be a source of error. The veri cation processes used must ensure both the correctness of the comp...
Paul Curzon, Ann Blandford
IH
2004
Springer
14 years 3 months ago
On the Possibility of Non-invertible Watermarking Schemes
Recently, there are active discussions on the possibility of non-invertible watermarking scheme. A non-invertible scheme prevents an attacker from deriving a valid watermark from a...
Qiming Li, Ee-Chien Chang
ISW
2004
Springer
14 years 3 months ago
Practical Authenticated Key Agreement Using Passwords
Due to the low entropy of human-memorable passwords, it is not easy to conduct password authenticated key agreement in a secure manner. Though there are many protocols achieving th...
Taekyoung Kwon
ECCV
2010
Springer
14 years 3 months ago
Graph Cut based Inference with Co-occurrence Statistics
Abstract. Markov and Conditional random fields (CRFs) used in computer vision typically model only local interactions between variables, as this is computationally tractable. In t...
ICRA
2003
IEEE
128views Robotics» more  ICRA 2003»
14 years 3 months ago
Improvement of passive elements for wearable haptic displays
In this paper, three fundamental techniques to improve laminated passive elements are proposed for wearable haptic displays. First, a new shape of sheet surfaces in laminated pass...
Sadao Kawamura, Katsuya Kanaoka, Yuichiro Nakayama...