Sciweavers

5723 search results - page 1110 / 1145
» Managing the network
Sort
View
OZCHI
2009
ACM
15 years 7 months ago
Towards an ethical interaction design: the issue of including stakeholders in law-enforcement software development
In the public sector (particularly in the UK in light of recent reforms i.e. the Local Government Act 2000, etc.) a greater degree of accountability and public involvement or inte...
Patrick G. Watson, Penny Duquenoy, Margaret Brenna...
CCS
2009
ACM
15 years 7 months ago
False data injection attacks against state estimation in electric power grids
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System mo...
Yao Liu, Michael K. Reiter, Peng Ning
98
Voted
ISW
2009
Springer
15 years 7 months ago
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
The frequency and severity of a number of recent intrusions involving data theft and leakages has shown that online users’ trust, voluntary or not, in the ability of third partie...
Matthew Burnside, Angelos D. Keromytis
95
Voted
IWANN
2009
Springer
15 years 7 months ago
On the Bond Graphs in the Delaunay-Tetrahedra of the Simplicial Decomposition of Spatial Protein Structures
The examination of straightforwardly definable discrete structures in nucleic acids and proteins turned out to be perhaps the most important development in our present knowledge a...
Rafael Ördög, Vince Grolmusz
MHCI
2009
Springer
15 years 7 months ago
Information empowerment through mobile learning
Information empowers those who make sense from its successful interpretation; this is especially true on the subject of weather where the recipient is required to have prior forms...
Raymond Koon Chuan Koh, Henry Xin Liong Tan, Henry...
« Prev « First page 1110 / 1145 Last » Next »