Sciweavers

758 search results - page 124 / 152
» User Control over User Adaptation: A Case Study
Sort
View
EUROCRYPT
2005
Springer
14 years 1 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
HUC
2009
Springer
14 years 8 days ago
It's not all about "Green": energy use in low-income communities
Personal energy consumption, specifically home energy consumption such as heating, cooling, and electricity, has been an important environmental and economic topic for decades. De...
Tawanna Dillahunt, Jennifer Mankoff, Eric Paulos, ...
MASCOTS
2003
13 years 9 months ago
An Evaluation Framework For Active Queue Management Schemes
Over the last decade numerous Active Queue Management (AQM) schemes have been proposed in the literature. Many of these studies have been directed towards improving congestion con...
Arkaitz Bitorika, Mathieu Robin, Meriel Huggard
CW
2005
IEEE
14 years 1 months ago
Agent Models for Dynamic 3D Virtual Worlds
Agents are systems capable of perceiving their environment through sensors, reasoning about their sensory input using some characteristic reasoning process and acting in their env...
Mary Lou Maher, Kathryn Elizabeth Merrick
NAR
2011
248views Computer Vision» more  NAR 2011»
12 years 10 months ago
NCBI GEO: archive for functional genomics data sets - 10 years on
A decade ago, the Gene Expression Omnibus (GEO) database was established at the National Center for Biotechnology Information (NCBI). The original objective of GEO was to serve as...
Tanya Barrett, Dennis B. Troup, Stephen E. Wilhite...