Sciweavers

1443 search results - page 175 / 289
» Aging Users are Still Users
Sort
View
118
Voted
RV
2007
Springer
151views Hardware» more  RV 2007»
15 years 6 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
SG
2007
Springer
15 years 6 months ago
A Sketch-Based Interface for Modeling Myocardial Fiber Orientation
: We propose a sketch-based interface for modeling the myocardial fiber orientation required in the electrophysiological simulation of the heart, especially the ventricles. The use...
Kenshi Takayama, Takeo Igarashi, Ryo Haraguchi, Ka...
ACMDIS
2004
ACM
15 years 6 months ago
The calder toolkit: wired and wireless components for rapidly prototyping interactive devices
Toolkits and other tools have dramatically reduced the time and technical expertise needed to design and implement graphical user interfaces (GUIs) allowing high-quality, iterativ...
Johnny C. Lee, Daniel Avrahami, Scott E. Hudson, J...
124
Voted
SIGIR
2004
ACM
15 years 6 months ago
A nonparametric hierarchical bayesian framework for information filtering
Information filtering has made considerable progress in recent years.The predominant approaches are content-based methods and collaborative methods. Researchers have largely conc...
Kai Yu, Volker Tresp, Shipeng Yu
ASIACRYPT
2003
Springer
15 years 6 months ago
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes
Abstract. We study two closely related primitives: Broadcast Encryption and Key Predistribution Schemes (KPS). Broadcast Encryption allows a broadcaster to broadcast an encrypted m...
Nuttapong Attrapadung, Kazukuni Kobara, Hideki Ima...