Sciweavers

17 search results - page 3 / 4
» Behavioral response to phishing risk
Sort
View
ECSCW
2007
13 years 7 months ago
Bringing Round-Robin Signature to Computer-Mediated Communication
In computer-mediated group communication, anonymity enables participants to post controversial comments without risking accusations of improper behavior. While this may encourage m...
Takeshi Nishida, Takeo Igarashi
WSCG
2003
148views more  WSCG 2003»
13 years 7 months ago
Generating Nonverbal Indicators of Deception in Virtual Reality Training
Old Dominion University (ODU) has been performing research in the area of training using virtual environments. The research involves both computer controlled agents and human part...
Frederic Rick McKenzie, Mark W. Scerbo, Jean M. Ca...
ISCC
2007
IEEE
127views Communications» more  ISCC 2007»
14 years 18 days ago
Head-to-Tail: Managing Network Load through Random Delay Increase
Window-based congestion control is typically based on exhausting bandwidth capacity, which occasionally leads to transient congestion. Moreover, flow synchronization may deteriora...
Stylianos Dimitriou, Vassilis Tsaoussidis
CDC
2010
IEEE
161views Control Systems» more  CDC 2010»
13 years 1 months ago
Circadian system modeling and phase control
Circadian rhythms are biological processes found in all living organisms, from plants to insects to mammals that repeat with a period close to, but not exactly, 24 hours. In the ab...
Jiaxiang Zhang, Andrew Bierman, John T. Wen, Agung...
TMI
2010
122views more  TMI 2010»
13 years 4 months ago
Feature Based Nonrigid Brain MR Image Registration With Symmetric Alpha Stable Filters
—A new feature based nonrigid image registration method for magnetic resonance (MR) brain images is presented in this paper. Each image voxel is represented by a rotation invaria...
Shu Liao, Albert C. S. Chung