Sciweavers

2631 search results - page 269 / 527
» Less is More
Sort
View
169
Voted
CORR
2007
Springer
93views Education» more  CORR 2007»
15 years 3 months ago
Performance Analysis for Multichannel Reception of OOFSK Signaling
— 1 In this paper, the error performance of onoff frequency shift keying (OOFSK) modulation over fading channels is analyzed when the receiver is equipped with multiple antennas....
Qingyun Wang, Mustafa Cenk Gursoy
SP
2008
IEEE
115views Security Privacy» more  SP 2008»
15 years 3 months ago
Compromising Reflections-or-How to Read LCD Monitors around the Corner
We present a novel eavesdropping technique for spying at a distance on data that is displayed on an arbitrary computer screen, including the currently prevalent LCD monitors. Our ...
Michael Backes, Markus Dürmuth, Dominique Unr...
SOUPS
2005
ACM
15 years 9 months ago
Stopping spyware at the gate: a user study of privacy, notice and spyware
Spyware is a significant problem for most computer users. The term “spyware” loosely describes a new class of computer software. This type of software may track user activitie...
Nathaniel Good, Rachna Dhamija, Jens Grossklags, D...
116
Voted
BCSHCI
2007
15 years 5 months ago
Cueing retrospective verbal reports in usability testing through eye-movement replay
An experimental validation is presented of a novel method for usability testing that entails the playback of dynamic eyetracking data to cue the elicitation of retrospective verba...
Nicola Eger, Linden J. Ball, Robert Stevens, Jon D...
110
Voted
ICML
2006
IEEE
16 years 4 months ago
Topic modeling: beyond bag-of-words
Some models of textual corpora employ text generation methods involving n-gram statistics, while others use latent topic variables inferred using the "bag-of-words" assu...
Hanna M. Wallach