Sciweavers

27 search results - page 6 / 6
» Limits to Anonymity When Using Credentials
Sort
View
HICSS
1994
IEEE
141views Biometrics» more  HICSS 1994»
13 years 9 months ago
Empirical CATeam Research in Meetings
Meeting research and especially research on Computer Supported Meetings of natural teams is not available in abundance. What is reported of meetings often uses a rather limited th...
Helmut Krcmar, Henrik Lewe, Gerhard Schwabe
CCS
2009
ACM
14 years 10 hour ago
False data injection attacks against state estimation in electric power grids
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System mo...
Yao Liu, Michael K. Reiter, Peng Ning