Sciweavers

405 search results - page 38 / 81
» Avatar-centric Risk Evaluation
Sort
View
COMCOM
2007
100views more  COMCOM 2007»
14 years 9 months ago
Using the vulnerability information of computer systems to improve the network security
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Yeu-Pong Lai, Po-Lun Hsia
TASE
2008
IEEE
14 years 9 months ago
Stochastic Modeling of an Automated Guided Vehicle System With One Vehicle and a Closed-Loop Path
Abstract--The use of automated guided vehicles (AGVs) in material-handling processes of manufacturing facilities and warehouses isbecomingincreasinglycommon.AcriticaldrawbackofanAG...
Aykut F. Kahraman, Abhijit Gosavi, Karla J. Oty
CHI
2007
ACM
15 years 1 months ago
"Get real!": what's wrong with hci prototyping and how can we fix it?
A prototype of computing technology--as a means to evaluate and communicate a good idea--is often an essential step towards useful, shipping products and towards a deeper understa...
William Jones, Jared M. Spool, Jonathan Grudin, Vi...
ICCV
2009
IEEE
16 years 2 months ago
Quantifying Contextual Information for Object Detection
Context is critical for minimising ambiguity in object de- tection. In this work, a novel context modelling framework is proposed without the need of any prior scene segmen- tat...
Wei-Shi Zheng, Shaogang Gong and Tao Xiang
CHI
2010
ACM
15 years 4 months ago
The secure haptic keypad: a tactile password system
Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
Andrea Bianchi, Ian Oakley, Dong Soo Kwon