Sciweavers

92 search results - page 12 / 19
» Active Audition for Humanoid
Sort
View
ACSAC
2006
IEEE
15 years 5 months ago
An Internet Voting System Supporting User Privacy
This work introduces the A system1 , an Internetbased, free and open source electronic voting system which employs strong cryptography. Our system is a fully functiona...
Aggelos Kiayias, Michael Korman, David Walluck
UIST
2005
ACM
15 years 5 months ago
DT controls: adding identity to physical interfaces
In this paper, we show how traditional physical interface components such as switches, levers, knobs and touch screens can be easily modified to identify who is activating each co...
Paul H. Dietz, Bret Harsham, Clifton Forlines, Dar...
CSCWD
2005
Springer
15 years 1 months ago
Process mining in CSCW systems
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Wil M. P. van der Aalst
AEI
2007
119views more  AEI 2007»
14 years 12 months ago
Exploring the CSCW spectrum using process mining
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Wil M. P. van der Aalst
CN
1999
91views more  CN 1999»
14 years 11 months ago
On the Security of Pay-per-Click and Other Web Advertising Schemes
We present a hit inflation attack on pay-per-click Web advertising schemes. Our attack is virtually impossible for the program provider to detect conclusively, regardless of wheth...
Vinod Anupam, Alain J. Mayer, Kobbi Nissim, Benny ...