Sciweavers

6560 search results - page 1311 / 1312
» The Human Context of Information Systems
Sort
View
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
13 years 4 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
CANDC
2009
ACM
13 years 4 months ago
A tale of two online communities: fostering collaboration and creativity in scientists and children
There has been much recent interest in the development of tools to foster remote collaboration and shared creative work. An open question is: what are the guidelines for this proc...
Cecilia R. Aragon, Sarah S. Poon, Andrés Mo...
ICNS
2009
IEEE
13 years 3 months ago
A BitTorrent Performance Evaluation Framework
In the last decade, file sharing systems have generally been dominated by P2P solutions. Whereas e-mail and HTTP have been the killer apps of the earlier Internet, a large percent...
Razvan Deaconescu, Razvan Rughinis, Nicolae Tapus
MIA
2011
170views more  MIA 2011»
13 years 19 days ago
Robust statistical shape models for MRI bone segmentation in presence of small field of view
Accurate bone modeling from medical images is essential in the diagnosis and treatment of patients because it supports the detection of abnormal bone morphology, which is often re...
Jérôme Schmid, Jinman Kim, Nadia Magn...
BMCBI
2011
12 years 9 months ago
PRIN, a predicted rice interactome network
Background: Protein-protein interactions play a fundamental role in elucidating the molecular mechanisms of biomolecular function, signal transductions and metabolic pathways of l...
Haibin Gu, Pengcheng Zhu, Yinming Jiao, Yijun Meng...
« Prev « First page 1311 / 1312 Last » Next »