Sciweavers

1186 search results - page 104 / 238
» A New Approach to Secure Logging
Sort
View
100
Voted
ICNS
2009
IEEE
14 years 10 months ago
Supporting High-Tech Crime Investigation through Dynamic Service Integration
In this paper we introduce the idea of integrating high security level services to support law enforcement with high-tech crime investigation. We take advantage of a process-orien...
Cezary Mazurek, Maciej Stroinski, Dariusz Walczak,...
89
Voted
ICMCS
2009
IEEE
119views Multimedia» more  ICMCS 2009»
14 years 10 months ago
Aspect-based video browsing - A user study
In this paper, we present a user study on a novel video search interface based on the concept of aspect browsing. We aim to confirm whether automatically suggesting new aspects ca...
Frank Hopfgartner, Thierry Urruty, David Hannah, D...
82
Voted
CCS
2009
ACM
15 years 7 months ago
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Third-party cloud computing represents the promise of outsourcing as applied to computation. Services, such as Microsoft’s Azure and Amazon’s EC2, allow users to instantiate v...
Thomas Ristenpart, Eran Tromer, Hovav Shacham, Ste...
CHI
2010
ACM
15 years 7 months ago
UpStream: motivating water conservation with low-cost water flow sensing and persuasive displays
Water is our most precious and most rapidly declining natural resource. We explore pervasive technology as an approach for promoting water conservation in public and private space...
Stacey Kuznetsov, Eric Paulos
77
Voted
WDAG
2009
Springer
103views Algorithms» more  WDAG 2009»
15 years 7 months ago
Distributed Discovery of Large Near-Cliques
Given an undirected graph and 0 ≤ ≤ 1, a set of nodes is called -near clique if all but an fraction of the pairs of nodes in the set have a link between them. In this paper we...
Zvika Brakerski, Boaz Patt-Shamir