Sciweavers

8655 search results - page 508 / 1731
» Challenges for Trusted Computing
Sort
View
SIGECOM
2004
ACM
77views ECommerce» more  SIGECOM 2004»
15 years 10 months ago
Stopping outgoing spam
We analyze the problem of preventing outgoing spam. We show that some conventional techniques for limiting outgoing spam are likely to be ineffective. We show that while imposing...
Joshua T. Goodman, Robert Rounthwaite
VLDB
2004
ACM
101views Database» more  VLDB 2004»
15 years 10 months ago
HiFi: A Unified Architecture for High Fan-in Systems
Advances in data acquisition and sensor technologies are leading towards the development of “High Fan-in” architectures: widely distributed systems whose edges consist of nume...
Owen Cooper, Anil Edakkunni, Michael J. Franklin, ...
SIGUCCS
2003
ACM
15 years 10 months ago
Instructional support at small universities: a training perspective
This paper intends to present the challenges and opportunities encountered in technology training at small institutions using Trinity University as a case in point. During the cou...
Vidya Ananthanarayanan, Judith Reiffert
CHI
2009
ACM
15 years 9 months ago
Discriminating the relevance of web search results with measures of pupil size
The overwhelming amount of information on the web makes it critical for users to quickly and accurately evaluate the relevance of content. Here we tested whether pupil size can be...
Flavio T. P. Oliveira, Anne Aula, Daniel M. Russel...
ATAL
2008
Springer
15 years 6 months ago
Autonomous geocaching: navigation and goal finding in outdoor domains
This paper describes an autonomous robot system designed to solve the challenging task of geocaching. Geocaching involves locating a goal object in an outdoor environment given on...
James Neufeld, Michael Sokolsky, Jason Roberts, Ad...