Sciweavers

1995 search results - page 268 / 399
» What's the Problem
Sort
View
WMTE
2006
IEEE
15 years 10 months ago
Handheld-Mediated Communication to Support the Effective Sharing of Meaning in Joint Activity
This paper reports the results of a laboratory study of a proposed solution to the problem of coordinating entry into collaborative activity while protecting the privacy and contr...
Kibum Kim, Deborah G. Tatar, Steve R. Harrison
ADMA
2006
Springer
127views Data Mining» more  ADMA 2006»
15 years 10 months ago
Feature Selection for Complex Patterns
Feature selection is an important data preprocessing step in data mining and pattern recognition. Many algorithms have been proposed in the past for simple patterns that can be cha...
Peter Schenkel, Wanqing Li, Wanquan Liu
NSPW
2006
ACM
15 years 10 months ago
PKI design for the real world
What would a PKI look like if it were designed for implementability and deployability rather than strict adherence to a particular theoretical or mathematical model? This paper pr...
Peter Gutmann
151
Voted
SCESM
2006
ACM
257views Algorithms» more  SCESM 2006»
15 years 10 months ago
Test ready UML statechart models
The dynamic behavior of systems is best described by Finite-state machines. Generation of executable tests from behavioral models such as UML Statecharts offers benefits such as s...
P. V. R. Murthy, P. C. Anitha, M. Mahesh, Rajesh S...
ACSAC
2005
IEEE
15 years 9 months ago
Graphical Passwords: A Survey
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend ...
Xiaoyuan Suo, Ying Zhu, G. Scott Owen