Sciweavers

813 search results - page 31 / 163
» desire 2010
Sort
View
ACNS
2010
Springer
133views Cryptology» more  ACNS 2010»
13 years 11 months ago
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm
Abstract. We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on...
Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wan...
ICIP
2010
IEEE
13 years 5 months ago
Performance impact of ordinal ranking on content fingerprinting
Content fingerprinting provides a compact representation of multimedia objects for copy identification. This paper analyzes the impact of the ordinal-ranking based feature encodin...
Wei-Hong Chuang, Avinash L. Varna, Min Wu
ICWE
2010
Springer
14 years 10 days ago
Extracting Client-Side Web User Interface Controls
Web applications that are highly dynamic and interactive on the client side are becoming increasingly popular. As with any other type of applications, reuse offers considerable ben...
Josip Maras, Maja Stula, Jan Carlson
ICRA
2010
IEEE
215views Robotics» more  ICRA 2010»
13 years 6 months ago
Adaptive admittance control of a robot manipulator under task space constraint
— We present adaptive admittance control of a robotic manipulator, with uncertain dynamic parameters, operating in a constrained task space. To provide compliance to external for...
Keng Peng Tee, Rui Yan, Haizhou Li
TCIAIG
2010
13 years 2 months ago
Modeling Player Experience for Content Creation
In this paper, we use computational intelligence techniques to built quantitative models of player experience for a platform game. The models accurately predict certain key affecti...
Christopher Pedersen, Julian Togelius, Georgios N....