Sciweavers

6120 search results - page 1019 / 1224
» The Power of Linear Functions
Sort
View
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
15 years 9 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
WISE
2006
Springer
15 years 9 months ago
Quantified Matchmaking of Heterogeneous Services
As the service-oriented computing paradigm and its related technologies mature, it is expected that electronic services will continue to grow in numbers. In such a setting, the cou...
Michael Pantazoglou, Aphrodite Tsalgatidou, George...
HASKELL
2006
ACM
15 years 9 months ago
Polymorphic variants in Haskell
In languages that support polymorphic variants, a single variant value can be passed to many contexts that accept different sets of constructors. Polymorphic variants are potenti...
Koji Kagawa
MINENET
2006
ACM
15 years 9 months ago
SVM learning of IP address structure for latency prediction
We examine the ability to exploit the hierarchical structure of Internet addresses in order to endow network agents with predictive capabilities. Specifically, we consider Suppor...
Robert Beverly, Karen R. Sollins, Arthur Berger
149
Voted
CVPR
2010
IEEE
15 years 9 months ago
Contour People: A Parameterized Model of 2D Articulated Human Shape
We define a new “contour person” model of the human body that has the expressive power of a detailed 3D model and the computational benefits of a simple 2D part-based model....
Oren Freifeld, Alex Weiss, Silvia Zuffi, Michael B...
« Prev « First page 1019 / 1224 Last » Next »