Sciweavers

1173 search results - page 54 / 235
» Identifying Successful Telecommuters
Sort
View
TKDE
2010
158views more  TKDE 2010»
14 years 10 months ago
Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses
—With the popularity of voting systems in cyberspace, there are growing evidence that the current voting systems can be manipulated by fake votes. This problem has attracted many...
Qinyuan Feng, Yan Lindsay Sun, Ling Liu, Yafei Yan...
ICML
2006
IEEE
16 years 19 days ago
Iterative RELIEF for feature weighting
RELIEF is considered one of the most successful algorithms for assessing the quality of features. In this paper, we propose a set of new feature weighting algorithms that perform s...
Yijun Sun, Jian Li
CHI
2004
ACM
16 years 6 days ago
Feeling bumps and holes without a haptic interface: the perception of pseudo-haptic textures
We present a new interaction technique to simulate textures in desktop applications without a haptic interface. The proposed technique consists in modifying the motion of the curs...
Anatole Lécuyer, Jean-Marie Burkhardt, Laur...
CSE
2009
IEEE
15 years 6 months ago
Architectural Support for Automated Software Attack Detection, Recovery, and Prevention
—Attacks on software systems are an increasingly serious problem from an economic and security standpoint. Many techniques have been proposed ranging from simple compiler modifi...
Jesse Sathre, Alex Baumgarten, Joseph Zambreno
NOSSDAV
2009
Springer
15 years 6 months ago
Cross-tree adjustment for spatialized audio streaming over networked virtual environments
In recent years, integrated spatialized voice services have become an appealing application for networked virtual environments (NVE), e.g., Second Life. With a spatialized voice s...
Ke Liang, Roger Zimmermann