Sciweavers

10837 search results - page 1989 / 2168
» Adaptive User Interfaces
Sort
View
CHES
2005
Springer
111views Cryptology» more  CHES 2005»
15 years 9 months ago
Security Limits for Compromising Emanations
Nearly half a century ago, military organizations introduced “Tempest” emission-security test standards to control information leakage from unintentional electromagnetic emanat...
Markus G. Kuhn
ERCIMDL
2005
Springer
99views Education» more  ERCIMDL 2005»
15 years 9 months ago
Management and Sharing of Bibliographies
Abstract. Managing bibliographic data is a requirement for many researchers, and in the group setting within which the majority of research takes place, the managing and sharing of...
Erik Wilde, Sai Anand, Petra Zimmermann
183
Voted
KES
2005
Springer
15 years 9 months ago
Design of a Digital Forensics Image Mining System
Increasing amount of illicit image data transmitted via the internet has triggered the need to develop effective image mining systems for digital forensics purposes. This paper dis...
Ross Brown, Binh Pham, Olivier Y. de Vel
ACMACE
2004
ACM
15 years 9 months ago
Compelling experiences in mixed reality interactive storytelling
Entertainment systems promise to be a significant application for Mixed Reality. Recently, a growing number of Mixed Reality applications have included interaction with virtual ac...
Fred Charles, Marc Cavazza, Steven J. Mead, Olivie...
SIGECOM
2004
ACM
120views ECommerce» more  SIGECOM 2004»
15 years 9 months ago
Robust incentive techniques for peer-to-peer networks
Lack of cooperation (free riding) is one of the key problems that confronts today’s P2P systems. What makes this problem particularly difficult is the unique set of challenges ...
Michal Feldman, Kevin Lai, Ion Stoica, John Chuang
« Prev « First page 1989 / 2168 Last » Next »