Sciweavers

145 search results - page 25 / 29
» The Fidelity of the Tag-Antitag System
Sort
View
CHI
2008
ACM
14 years 7 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
ICAS
2009
IEEE
197views Robotics» more  ICAS 2009»
14 years 2 months ago
Web QoE Evaluation in Multi-agent Networks: Validation of ITU-T G.1030
— User’s requirements have become a key factor for any Quality of Service (QoS) management model to succeed. The advent and rise of new broadband services and network architect...
Eva Ibarrola, Fidel Liberal, Ianire Taboada, Rodri...

Publication
220views
15 years 7 months ago
Exploiting the Impact of Database System Configuration Parameters: A Design of Experiments Approach
Tuning database system configuration parameters to proper values according to the expected query workload plays a very important role in determining DBMS performance. However, the ...
Biplob K. Debnath, Mohamed F. Mokbel, David J. Lil...
ICDE
2006
IEEE
181views Database» more  ICDE 2006»
14 years 8 months ago
Adaptive Reorganization of Coherency-Preserving Dissemination Tree for Streaming Data
In many recent applications, data are continuously being disseminated from a source to a set of servers. In this paper, we propose a cost-based approach to construct dissemination...
Yongluan Zhou, Beng Chin Ooi, Kian-Lee Tan, Feng Y...
ICPR
2008
IEEE
14 years 8 months ago
3D ear modeling and recognition from video sequences using shape from shading
We describe a novel approach for 3D ear biometrics using video. A series of frames are extracted from a video clip and the region-of-interest (ROI) in each frame is independently ...
Mohamed Abdel-Mottaleb, Steven Cadavid