Sciweavers

1456 search results - page 101 / 292
» Keeping encountered information
Sort
View
100
Voted
ICDIM
2007
IEEE
15 years 8 months ago
Fast encounter-based synchronization for mobile devices
The large and growing number of computing devices used by individuals has caused the challenges of distributed storage to take on increased importance. In addition to desktops and...
Daniel Peek, Douglas B. Terry, Venugopalan Ramasub...
111
Voted
SIGITE
2006
ACM
15 years 7 months ago
Does a virtual networking laboratory result in similar student achievement and satisfaction?
Delivery of content in networking and system administration curricula involves significant hands-on laboratory experience supplementing traditional classroom instruction at the Ro...
Edith A. Lawson, William Stackpole
SOUPS
2006
ACM
15 years 7 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
WACV
2005
IEEE
15 years 7 months ago
A Hierarchical Approach to Sign Recognition
Sighted individuals draw a significant amount of information from signs but this information is denied to the visually impaired. VIDI is an evolving system for detecting and reco...
Piyanuch Silapachote, Allen R. Hanson, Richard S. ...
SOUPS
2005
ACM
15 years 7 months ago
Making PRIME usable
Privacy-enhanced Identity Management can enable users to retain and maintain informational self-determination in our networked society. This paper describes the usability research...
John Sören Pettersson, Simone Fischer-Hü...