Sciweavers

2514 search results - page 147 / 503
» Design, Implementation, and Evaluation of a Digital Lectern ...
Sort
View
ACSAC
2002
IEEE
15 years 6 months ago
Thirty Years Later: Lessons from the Multics Security Evaluation
Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and cu...
Paul A. Karger, Roger R. Schell
DBSEC
2007
128views Database» more  DBSEC 2007»
15 years 3 months ago
gVault: A Gmail Based Cryptographic Network File System
Abstract. In this paper, we present the design of gVault, a cryptographic network file system that utilizes the data storage provided by Gmail’s web-based email service. Such a ...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
NIME
2005
Springer
107views Music» more  NIME 2005»
15 years 7 months ago
The Role of Time in Engineering Computer Music Systems
Discussion of time in interactive computer music systems engineering has been largely limited to data acquisition rates and latency. Since music is an inherently time-based medium...
Eric Lee, Jan Borchers
109
Voted
ACL
2010
14 years 11 months ago
Coreference Resolution with Reconcile
Despite the existence of several noun phrase coreference resolution data sets as well as several formal evaluations on the task, it remains frustratingly difficult to compare resu...
Veselin Stoyanov, Claire Cardie, Nathan Gilbert, E...
SI3D
2006
ACM
15 years 7 months ago
ShowMotion: camera motion based 3D design review
We describe a new interactive system for 3D design review, built to exploit the visual perception cue of motion parallax, in order to enhance shape perception and aesthetic evalua...
Nicholas Burtnyk, Azam Khan, George W. Fitzmaurice...