Sciweavers

632 search results - page 7 / 127
» Two Facets of Authentication
Sort
View
CHI
2003
ACM
14 years 10 months ago
Faceted metadata for image search and browsing
There are currently two dominant interface types for searching and browsing large image collections: keywordbased search, and searching by overall similarity to sample images. We ...
Ka-Ping Yee, Kirsten Swearingen, Kevin Li, Marti A...
MST
2010
110views more  MST 2010»
13 years 8 months ago
Facets of the Fully Mixed Nash Equilibrium Conjecture
In this work, we continue the study of the many facets of the Fully Mixed Nash Equilibrium Conjecture, henceforth abbreviated as the FMNE Conjecture, in selfish routing for the s...
Rainer Feldmann, Marios Mavronicolas, Andreas Pier...
MOR
2002
102views more  MOR 2002»
13 years 9 months ago
Facets of the Complementarity Knapsack Polytope
We present a polyhedral study of the complementarity knapsack problem. Traditionally, complementarity constraints are modeled by introducing auxiliary binary variables and additio...
Ismael R. de Farias Jr., Ellis L. Johnson, George ...
SOUPS
2009
ACM
14 years 4 months ago
Educated guess on graphical authentication schemes: vulnerabilities and countermeasures
This paper investigate security of graphical authentication tokens against educated guess attacks. Results of two user studies indicate that, if we use original photos as authenti...
Eiji Hayashi, Jason Hong, Nicolas Christin
ERCIMDL
2008
Springer
75views Education» more  ERCIMDL 2008»
13 years 11 months ago
Matching Hierarchies Using Shared Objects
One of the main challenges in integrating two hierarchies is determining the correspondence between the edges of each hierarchy. Traditionally, this process, which we call hierarch...
Robert Ikeda, Kai Zhao, Hector Garcia-Molina