Sciweavers

11589 search results - page 2061 / 2318
» Human computation
Sort
View
WWW
2008
ACM
16 years 5 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
CSCW
2004
ACM
15 years 10 months ago
Controlling interruptions: awareness displays and social motivation for coordination
Spontaneous communication is common in the workplace but can be disruptive. Such communication usually benefits the initiator more than the target of an interruption. Previous res...
Laura A. Dabbish, Robert E. Kraut
WPES
2004
ACM
15 years 10 months ago
Privacy management for portable recording devices
The growing popularity of inexpensive, portable recording devices, such as cellular phone cameras and compact digital audio recorders, presents a significant new threat to privac...
J. Alex Halderman, Brent R. Waters, Edward W. Felt...
3DPVT
2002
IEEE
172views Visualization» more  3DPVT 2002»
15 years 9 months ago
3D objects visualization for remote interactive medical applications
3D medical images produced in health centers represent tremendous amounts of data spread over different places. Automatic processing of these data often allow quantitative and rep...
Johan Montagnat, Eduardo Davila, Isabelle E. Magni...
EATIS
2009
ACM
15 years 7 months ago
Agent based smart house platform with affective control
In this paper, we describe our work in developing an agent based smart house platform using TAOM4E development methodology and the JADE-platform with the Jadex-extension. In order...
Kuderna-Iulian Benta, Amalia Hoszu, Lucia Vacariu,...
« Prev « First page 2061 / 2318 Last » Next »