Sciweavers

818 search results - page 71 / 164
» formats 2007
Sort
View
ISPEC
2007
Springer
15 years 10 months ago
Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems
Considerable research and experiment results in recent years have shown that the server-proxy-user architecture represents an efficient and scalable new paradigm for multimedia con...
Robert H. Deng, Yanjiang Yang
ICIP
2007
IEEE
15 years 11 months ago
Using Dempster-Shafer Theory to Fuse Multiple Information Sources in Region-Based Segmentation
This paper presents a new method for segmentation of images into large regions that reflect the real world objects present in a scene. It explores the feasibility of utilizing sp...
Tomasz Adamek, Noel E. O'Connor
113
Voted
USENIX
2007
15 years 7 months ago
Passwords for Everyone: Secure Mnemonic-based Accessible Authentication
In many environments, a computer system is severely constrained to the extent that the practical input mechanisms are merely binary switches. Requiring the user to remember a long...
Umut Topkara, Mercan Topkara, Mikhail J. Atallah
ENGL
2007
71views more  ENGL 2007»
15 years 4 months ago
Two-dimensional Numerical Simulation of Combustion and Heat Transfer in Porous Burners
—In this study, combustion in a 5kW porous burner is simulated. The two dimensional Navier-Stokes, the energy and the chemical species transport equations are solved and a multis...
Meisam Farzaneh, Reza Ebrahimi, Mehrzad Shams, Moh...
136
Voted
ISCC
2007
IEEE
15 years 11 months ago
Composition for Enhanced SIP Presence
Presence has taken shape as a way to present a comprehensive view of the communications capabilities of a user or resource. Standardized protocols allow for receiving presence dat...
Ron Shacham, Wolfgang Kellerer, Henning Schulzrinn...