Sciweavers

3674 search results - page 277 / 735
» Information Dependencies
Sort
View
87
Voted
IEEEARES
2007
IEEE
15 years 7 months ago
Secure Web Application Development and Global Regulation
The World Wide Web (WWW) has been predominantly responsible for instigating radical paradigm transformations in today’s global information rich civilizations. Many societies hav...
William Bradley Glisson, L. Milton Glisson, Ray We...
101
Voted
IPSN
2004
Springer
15 years 6 months ago
Sensing uncertainty reduction using low complexity actuation
The performance of a sensor network may be best judged by the quality of application specific information return. The actual sensing performance of a deployed sensor network depe...
Aman Kansal, Eric Yuen, William J. Kaiser, Gregory...
103
Voted
AAI
2004
136views more  AAI 2004»
15 years 18 days ago
Between Location Awareness and Aware Locations: Where to Put The Intelligence
Location awareness is a key ingredient to many applications of mobile devices. Devices with the ability to determine their own position in space can retrieve, filter or present in...
Andreas Butz
IPPS
2007
IEEE
15 years 7 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
79
Voted
ETRA
2010
ACM
169views Biometrics» more  ETRA 2010»
15 years 7 months ago
Eye and pointer coordination in search and selection tasks
Selecting a graphical item by pointing with a computer mouse is a ubiquitous task in many graphical user interfaces. Several techniques have been suggested to facilitate this task...
Hans-Joachim Bieg, Lewis L. Chuang, Roland W. Flem...