Sciweavers

2097 search results - page 358 / 420
» Distributed user modelling for universal information access
Sort
View
ECRIME
2007
15 years 8 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
NAR
2008
138views more  NAR 2008»
15 years 4 months ago
TarO: a target optimisation system for structural biology
TarO (http://www.compbio.dundee.ac.uk/taro) offers a single point of reference for key bioinformatics analyses relevant to selecting proteins or domains for study by structural bi...
Ian M. Overton, C. A. Johannes van Niekerk, Lester...
MSWIM
2005
ACM
15 years 10 months ago
Content and service replication strategies in multi-hop wireless mesh networks
Emerging multi-hop wireless mesh networks have much different characteristics than the Internet. They have low dimensionality and large diameters. Content and service replication ...
Shudong Jin, Limin Wang
DRM
2005
Springer
15 years 10 months ago
Fairer usage contracts for DRM
DRM has been widely promoted as a means to enforce copyright. In many previous papers, it has been argued that DRM gives too much power to rights holders and actually goes beyond ...
Alapan Arnab, Andrew Hutchison
IJVR
2008
125views more  IJVR 2008»
15 years 4 months ago
Intelligent Mobile Agents for Large-Scale Collaborative Virtual Environment
The Web3D technologies make it possible to create Collaborative Virtual Environment (CVE) in the popular Internet, thus promoting the popularity of CVE scientific applications to b...
Qingping Lin, Liang Zhang, Sun Ding, Guorui Feng, ...