Sciweavers

842 search results - page 94 / 169
» About the authors
Sort
View
99
Voted
CSE
2009
IEEE
15 years 7 months ago
FaceCloak: An Architecture for User Privacy on Social Networking Sites
—Social networking sites, such as MySpace, Facebook and Flickr, are gaining more and more popularity among Internet users. As users are enjoying this new style of networking, pri...
Wanying Luo, Qi Xie, Urs Hengartner
134
Voted
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
15 years 7 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
100
Voted
AIED
2009
Springer
15 years 7 months ago
Looking Into Collaborative Learning: Design from Macro- and Micro-Script Perspectives
Design of collaborative learning (CL) scenarios is a complex task, but necessary if the goal of the collaboration is learning. Creating well-thought-out CL scenarios requires exper...
Eloy D. Villasclaras-Fernández, Seiji Isota...
104
Voted
IUI
2010
ACM
15 years 7 months ago
Usability guided key-target resizing for soft keyboards
Soft keyboards offer touch-capable mobile and tabletop devices many advantages such as multiple language support and space for larger graphical displays. On the other hand, becaus...
Asela Gunawardana, Tim Paek, Christopher Meek
99
Voted
CDC
2008
IEEE
143views Control Systems» more  CDC 2008»
15 years 7 months ago
On the use of numerical methods for analysis and control of nonlinear convective systems
Abstract— A common approach to designing feedback controllers for nonlinear partial differential equations (PDEs) is to linearize the system about an equilibrium and use the line...
Edward Allen, John A. Burns, David S. Gilliam