Sciweavers

3547 search results - page 613 / 710
» Computers Seeing People
Sort
View
SIGDOC
2004
ACM
15 years 5 months ago
Liability for defective content
Software publishers and information service providers publish information about their own products and about other products and people. Additional content might be incidental, suc...
Cem Kaner
SIGUCCS
2004
ACM
15 years 5 months ago
Spam software evaluation, training, and support: fighting back to reclaim the email inbox
This paper explains two projects dealing with spam recently completed at Iowa State University (ISU). The first project was undertaken by a team composed of members of the campus ...
Jeff Balvanz, Don Paulsen, Joe Struss
WS
2004
ACM
15 years 5 months ago
Security considerations for IEEE 802.15.4 networks
The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification ...
Naveen Sastry, David Wagner
CIA
2004
Springer
15 years 5 months ago
Towards Monitoring of Group Interactions and Social Roles via Overhearing
We are investigating how to provide intelligent, pervasive support of group of people within so-called “smart environments”. Our current main assumption, based on literature in...
Silvia Rossi, Paolo Busetta
CIS
2004
Springer
15 years 5 months ago
Fast Query Over Encrypted Character Data in Database
There are a lot of very important data in database, which need to be protected from attacking. Cryptographic support is an important mechanism of securing them. People, however, mu...
Zheng-Fei Wang, Jing Dai, Wei Wang 0009, Baile Shi