Sciweavers

28080 search results - page 5400 / 5616
» Multimedia Information Systems
Sort
View
ACMDIS
2010
ACM
15 years 5 months ago
Design from the everyday: continuously evolving, embedded exploratory prototypes
One of the major challenges in the design of social technologies is the evaluation of their qualities of use and how they are appropriated over time. While the field of HCI abound...
Clint Heyer, Margot Brereton
ISLPED
2010
ACM
170views Hardware» more  ISLPED 2010»
15 years 5 months ago
Low-power sub-threshold design of secure physical unclonable functions
The unique and unpredictable nature of silicon enables the use of physical unclonable functions (PUFs) for chip identification and authentication. Since the function of PUFs depen...
Lang Lin, Daniel E. Holcomb, Dilip Kumar Krishnapp...
151
Voted
RECSYS
2010
ACM
15 years 5 months ago
Affiliation recommendation using auxiliary networks
Social network analysis has attracted increasing attention in recent years. In many social networks, besides friendship links amongst users, the phenomenon of users associating th...
Vishvas Vasuki, Nagarajan Natarajan, Zhengdong Lu,...
164
Voted
SIGMOD
2010
ACM
207views Database» more  SIGMOD 2010»
15 years 5 months ago
Leveraging spatio-temporal redundancy for RFID data cleansing
Radio Frequency Identification (RFID) technologies are used in many applications for data collection. However, raw RFID readings are usually of low quality and may contain many an...
Haiquan Chen, Wei-Shinn Ku, Haixun Wang, Min-Te Su...
169
Voted
CMS
2010
150views Communications» more  CMS 2010»
15 years 5 months ago
Throwing a MonkeyWrench into Web Attackers Plans
Abstract. Client-based attacks on internet users with malicious web pages represent a serious and rising threat. Internet Browsers with enabled active content technologies such as ...
Armin Büscher, Michael Meier, Ralf Benzmü...
« Prev « First page 5400 / 5616 Last » Next »