Click based graphical passwords that use background images suffer from hot-spot problem. Previous graphical password schemes based on recognition of images do not have a sufficient...
Kemal Bicakci, Nart Bedin Atalay, Mustafa Yuceel, ...
: In this paper we explore the possibilities to perform the search for results of non-deterministic computations in parallel. We present three different approaches to this problem:...
Logistics is a dynamic and heterogeneous application area for wearable computing. In this paper, wearable computing technologies are examined as basis for a support system for mobi...
This paper presents a graph-theoretical approach to lexical disambiguation on word co-occurrences. Producing a dictionary similar to WordNet, this method is the counterpart to word...
Our research group has developed new, stateof-the-art antispam software, described in other papers. We are in the process of deploying that software in a large production corporat...