Sciweavers

1399 search results - page 245 / 280
» A Pattern for Secure Graphical User Interface Systems
Sort
View
VIS
2007
IEEE
181views Visualization» more  VIS 2007»
16 years 6 months ago
Shadow-Driven 4D Haptic Visualization
Just as we can work with two-dimensional floor plans to communicate 3D architectural design, we can exploit reduced-dimension shadows to manipulate the higher-dimensional objects ...
Hui Zhang, Andrew J. Hanson
SWS
2004
ACM
15 years 10 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
AVI
2008
15 years 7 months ago
SyncDecor: communication appliances for virtual cohabitation
Despite the fact that various means of communication such as mobile phones, instant messenger and e-mail are now widespread; many romantic couples separated by long distances worr...
Hitomi Tsujita, Koji Tsukada, Itiro Siio
SIGITE
2004
ACM
15 years 10 months ago
The use of MUPPETS in an introductory java programming course
“The Multi-User Programming Pedagogy for Enhancing Traditional Study” (MUPPETS) system has been under development at RIT for the last three years. This multi-user environment ...
Kevin J. Bierre, Andrew M. Phelps
145
Voted
IJNSEC
2008
131views more  IJNSEC 2008»
15 years 5 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi