Sciweavers

2454 search results - page 332 / 491
» Privacy in the Information and Communications Technologies
Sort
View
106
Voted
DIM
2008
ACM
14 years 11 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le
CHI
2010
ACM
15 years 5 months ago
Family story play: reading with young children (and elmo) over a distance
We introduce Family Story Play, a system that supports grandparents to read books together with their grandchildren over the Internet. Family Story Play is designed to improve com...
Hayes Raffle, Rafael Ballagas, Glenda Revelle, Hir...
99
Voted
ICC
2009
IEEE
138views Communications» more  ICC 2009»
15 years 4 months ago
Optimising Radio Access in a Heterogeneous Wireless Network Environment
—A variety of wireless network technologies have been developed and deployed, including GSM, UMTS, WiFi and WiMAX. The advantages of having an integrated heterogeneous wireless n...
Weizhi Luo, Eliane L. Bodanese
MOBILITY
2009
ACM
15 years 4 months ago
Widgets mobility
Widgets are becoming a natural way to design small, intuitive application, and their usage is becoming widespread on both the desktop and the mobile world. However, most widgets s...
Jean Le Feuvre, Cyril Concolato, Jean-Claude Dufou...
CISS
2007
IEEE
15 years 4 months ago
Relay Placement and Movement Control for Realization of Fault-Tolerant Ad Hoc Networks
— Wireless communication is a critical component of battlefield networks. Nodes in a battlefield network exist in hostile environments and thus fault-tolerance against node and...
Abhishek Kashyap, Mark A. Shayman