Sciweavers

107 search results - page 15 / 22
» Privacy versus convenience
Sort
View
SP
2002
IEEE
114views Security Privacy» more  SP 2002»
14 years 11 months ago
Efficiently building on-line tools for distributed heterogeneous environments
Software development is getting more and more complex, especially within distributed middleware-based environments. A major drawback during the overall software development proces...
Günther Rackl, Thomas Ludwig 0002, Markus Lin...
MOC
2010
14 years 6 months ago
Analysis of a finite PML approximation to the three dimensional elastic wave scattering problem
We consider the application of a perfectly matched layer (PML) technique to approximate solutions to the elastic wave scattering problem in the frequency domain. The PML is viewed ...
James H. Bramble, Joseph E. Pasciak, Dimitar Trene...
MOC
2010
14 years 6 months ago
Convergence analysis of the Jacobi spectral-collocation methods for Volterra integral equations with a weakly singular kernel
In this paper, a Jacobi-collocation spectral method is developed for Volterra integral equations of the second kind with a weakly singular kernel. We use some function transformati...
Yanping Chen, Tao Tang
SOUPS
2006
ACM
15 years 5 months ago
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords
Previous research has found graphical passwords to be more memorable than non-dictionary or “strong” alphanumeric passwords. Participants in a prior study expressed concerns t...
Furkan Tari, A. Ant Ozok, Stephen H. Holden
110
Voted
WWW
2008
ACM
16 years 13 days ago
Setting Access Permission through Transitive Relationship in Web-based Social Networks
The rising popularity of Web 2.0, such as blogs, forums, online calendars/diaries, etc., makes users more interested in keeping their data on the Web. Sharing of such data could m...
Dan Hong, Vincent Y. Shen