Sciweavers

499 search results - page 71 / 100
» A Study on Latent Vulnerabilities
Sort
View
CSCW
2010
ACM
15 years 9 months ago
Interorganizational coordination and awareness in a nonprofit ecosystem
Nonprofit organizations working with high-risk vulnerable populations such as human trafficking victims often need to engage in a significant level of interorganizational collabor...
Jennifer Stoll, W. Keith Edwards, Elizabeth D. Myn...
WISEC
2010
ACM
15 years 7 months ago
On the reliability of wireless fingerprinting using clock skews
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. B...
Chrisil Arackaparambil, Sergey Bratus, Anna Shubin...
97
Voted
CHI
2010
ACM
15 years 7 months ago
Input precision for gaze-based graphical passwords
Click-based graphical passwords have been proposed as alternatives to text-based passwords, despite being potentially vulnerable to shoulder-surfing, where an attacker can learn p...
Alain Forget, Sonia Chiasson, Robert Biddle
89
Voted
AINA
2009
IEEE
15 years 7 months ago
An Evaluation of Routing Reliability in Non-collaborative Opportunistic Networks
An opportunistic network is a type of challenged network that has attracted a great deal of attention in recent years. While a number of schemes have been proposed to facilitate d...
Ling-Jyh Chen, Che-Liang Chiou, Yi-Chao Chen
101
Voted
BIBE
2009
IEEE
161views Bioinformatics» more  BIBE 2009»
15 years 7 months ago
Soft Tissue Deformation and Optimized Data Structures for Mass Spring Methods
One of the essential components of a virtual reality surgical simulation is deformation. Deformations in computer graphics and surgical simulations are commonly modeled with three...
Tansel Halic, Sinan Kockara, Coskun Bayrak, Richar...