Sciweavers

631 search results - page 14 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
ICPR
2008
IEEE
14 years 2 months ago
Application of the wrapper framework for image object detection
Tools for automatic image understanding for managing operator workloads are essential. One common task for image analysts is the scanning large collections of real-time images loo...
Michael Farmer
AIED
2007
Springer
14 years 1 months ago
Pedagogical Agents Trying on a Caring Mentor Role
: We describe the design and evaluation of an affective pedagogical agent persona for Intelligent Tutoring Systems. The goal of our research was to develop an agent embodying a per...
Konstantin Zakharov, Antonija Mitrovic, Lucy Johns...
ACL
2000
13 years 9 months ago
Multi-Component TAG and Notions of Formal Power
This paper presents a restricted version of Set-Local Multi-Component TAGs Weir, 1988 which retains the strong generative capacity of Tree-Local MultiComponent TAG i.e. produces t...
William Schuler, David Chiang, Mark Dras
IACR
2011
221views more  IACR 2011»
12 years 7 months ago
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
Süleyman Kardas, Mehmet Sabir Kiraz, Muhammed...
ICDAR
2009
IEEE
14 years 2 months ago
Machine Authentication of Security Documents
This paper presents a pioneering effort towards machine authentication of security documents like bank cheques, legal deeds, certificates, etc. that fall under the same class as f...
Utpal Garain, Biswajit Halder