نتایج جستجو برای: and identification moreover
تعداد نتایج: 16903915 فیلتر نتایج به سال:
Identifying sensitive user inputs is a prerequisite for privacy protection. When it comes to today’s program analysis systems, however, only those data that go through well-defined system APIs can be automatically labelled. In our research, we show that this conventional approach is far from adequate, as most sensitive inputs are actually entered by the user at an app’s runtime: in our research...
Abstract. Radio-frequency identification (RFID) is an automatic identification technology. In recent years, more and more applications have been found for its use. However, there are still many security issues worth discussing. In this paper, we propose a mutual authentication scheme, which can solve problems such as privacy, replay attack, forward security, and user location privacy. In our sc...
rfid has already found its way into a variety of large scale applications and arguably it is already one of themost successful technologies in the history of computing. Beyond doubt, rfid is an effective automatic identification technology for a variety of objects including natural, manufactured and handmade artifacts; humans and other species; locations; and increasingly media content and mobi...
In this paper, we present a study on the shopping behavior of customers based on the RFID(Radio Frequency IDentification) data in a Japanese supermarket. Through RFID data, it is possible to capture the individual difference of customers how to spend time on shopping in a certain area of the supermarket. Firstly, we deal with the RFID data of the customer shopping behavior and transform it to t...
Widely hailed as the next generation auto-identification technology, RFID has captured the imaginations of organizations across different industry sectors. Accordingly, organizational managers are faced with the important but difficult task of evaluating RFID in the context of their organization and deciding upon its adoption. This research uses the real options perspective to understand how ma...
Here we present an overview of a system we are developing for animating faces using appearance models. To facilitate more widespread use of animated characters, we are interested in developing techniques that: 1) require only easy to use and inexpensive data capture equipment, 2) are threedimensional allowing virtual characters to be animated, 3) allow a range of face models, from near-photorea...
Methods for the identification of models for hydrological forecasting have to consider the specific nature of these models and the uncertainties present in the modeling process. Current approaches fail to fully incorporate these two aspects. In this paper we review the nature of hydrological models and the consequences of this nature for the task of model identification. We then continue to dis...
This paper presents the URPAH team’s participation in DEFT 2012.Our approach uses noun phrases in the automatic identification of keywords indexing the content of scientific papers published in a review of Human and Social Sciences, with assistance from the terminology of keywords (piste1) and without terminology (piste2 ) MOTS-CLÉS : syntagmes nominaux, patrons syntaxiques, recherche d’informa...
Automatic identification of good arguments on a controversial topic has applications in civics and education, to name a few. While in the civics context it might be acceptable to create separate models for each topic, in the context of scoring of students’ writing there is a preference for a single model that applies to all responses. Given that good arguments for one topic are likely to be irr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید