Sciweavers

859 search results - page 69 / 172
» The Changing Face of Cryptography
Sort
View
ICMAS
1998
13 years 9 months ago
Simulating Value Chain Coordination with Artificial Life Agents
The increasing use of information technology within and between companies yields changes in the predominant coordination mechanisms. On one hand it is argued that we witness an ov...
Torsten Eymann, Boris Padovan, Detlef Schoder
IPM
2006
81views more  IPM 2006»
13 years 7 months ago
An implicit feedback approach for interactive information retrieval
Searchers can face problems finding the information they seek. One reason for this is that they may have difficulty devising queries to express their information needs. In this ar...
Ryen W. White, Joemon M. Jose, Ian Ruthven
IVC
2008
147views more  IVC 2008»
13 years 7 months ago
Distinctive and compact features
We consider the problem of extracting features for multi-class recognition problems. The features are required to make fine distinction between similar classes, combined with tole...
Ayelet Akselrod-Ballin, Shimon Ullman
ACSAC
2005
IEEE
14 years 1 months ago
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness
As evidenced by the proliferation of phishing attacks and keystroke loggers, we know that human beings are not wellequipped to make trust decisions about when to use their passwor...
Sara Sinclair, Sean W. Smith
ICIP
2007
IEEE
14 years 9 months ago
Determining Topology in a Distributed Camera Network
Recently, `entry/exit' events of objects in the field-of-views of cameras were used to learn the topology of the camera network. The integration of object appearance was also...
Xiaotao Zou, Bir Bhanu, Bi Song, Amit K. Roy Chowd...