Sciweavers

155 search results - page 12 / 31
» Statecharts in the making: a personal account
Sort
View
CCS
2004
ACM
13 years 11 months ago
A PIN-entry method resilient against shoulder surfing
Magnetic stripe cards are in common use for electronic payments and cash withdrawal. Reported incidents document that criminals easily pickpocket cards or skim them by swiping the...
Volker Roth, Kai Richter, Rene Freidinger
CIA
2000
Springer
13 years 11 months ago
Emergent Societies of Information Agents
In the near future, billions of entities will be connected to each other through the Internet. The current trend is that an increasingly number of entities, from smart personal dev...
Paul Davidsson
ADMA
2005
Springer
202views Data Mining» more  ADMA 2005»
13 years 9 months ago
A Latent Usage Approach for Clustering Web Transaction and Building User Profile
Web transaction data between web visitors and web functionalities usually convey users’ task-oriented behavior patterns. Clustering web transactions, thus, may capture such infor...
Yanchun Zhang, Guandong Xu, Xiaofang Zhou
IJCV
2006
266views more  IJCV 2006»
13 years 7 months ago
Kernel Density Estimation and Intrinsic Alignment for Shape Priors in Level Set Segmentation
In this paper, we make two contributions to the field of level set based image segmentation. Firstly, we propose shape dissimilarity measures on the space of level set functions wh...
Daniel Cremers, Stanley Osher, Stefano Soatto
IJSN
2006
116views more  IJSN 2006»
13 years 7 months ago
A lightweight encryption and authentication scheme for wireless sensor networks
: The research of Wireless Sensor Networks (WSNs) has recently received a strong boost from IEEE 802.15.4 task group, which focuses on the specifications for low rate wireless pers...
Jianliang Zheng, Jie Li, Myung J. Lee, Michael Ans...