Sciweavers

432 search results - page 55 / 87
» Telling Our Stories
Sort
View
FC
2010
Springer
135views Cryptology» more  FC 2010»
14 years 2 months ago
Multichannel Protocols to Prevent Relay Attacks
A number of security systems, from Chip-and-PIN payment cards to contactless subway and train tokens, as well as secure localization systems, are vulnerable to relay attacks. Encry...
Frank Stajano, Ford-Long Wong, Bruce Christianson
CHI
2001
ACM
14 years 1 months ago
Automating camera management for lecture room environments
Given rapid improvements in network infrastructure and streaming-media technologies, a large number of corporations and universities are recording lectures and making them availab...
Qiong Liu, Yong Rui, Anoop Gupta, Jonathan J. Cadi...
NA
2008
78views more  NA 2008»
13 years 10 months ago
A walk through energy, discrepancy, numerical integration and group invariant measures on measurable subsets of euclidean space
(A) The celebrated Gaussian quadrature formula on finite intervals tells us that the Gauss nodes are the zeros of the unique solution of an extremal problem. We announce recent re...
S. B. Damelin
VL
2010
IEEE
216views Visual Languages» more  VL 2010»
13 years 8 months ago
Explanatory Debugging: Supporting End-User Debugging of Machine-Learned Programs
Many machine-learning algorithms learn rules of behavior from individual end users, such as taskoriented desktop organizers and handwriting recognizers. These rules form a “prog...
Todd Kulesza, Simone Stumpf, Margaret M. Burnett, ...
IDEAL
2010
Springer
13 years 8 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...