Sciweavers

5722 search results - page 115 / 1145
» Security Function Interactions
Sort
View
109
Voted
AINA
2007
IEEE
15 years 7 months ago
Trust Enhanced Secure Mobile Ad-Hoc Network Routing
In recent years, several trust and reputation models have been proposed to enhance the security of mobile ad hoc networks. However, they either fail to capture evidence of trustwo...
Venkatesan Balakrishnan, Vijay Varadharajan, Phill...
91
Voted
RECOMB
2005
Springer
16 years 1 months ago
Modeling the Combinatorial Functions of Multiple Transcription Factors
A considerable fraction of yeast gene promoters are bound by multiple transcription factors. To study the combinatorial interactions of multiple transcription factors is thus impor...
Chen-Hsiang Yeang, Tommi Jaakkola
100
Voted
TEI
2010
ACM
268views Hardware» more  TEI 2010»
15 years 7 months ago
DisplayObjects: prototyping functional physical interfaces on 3d styrofoam, paper or cardboard models
This paper introduces DisplayObjects, a rapid prototyping workbench that allows functional interfaces to be projected onto real 3D physical prototypes. DisplayObjects uses a Vicon...
Eric Akaoka, Tim Ginn, Roel Vertegaal
87
Voted
ICMI
2007
Springer
160views Biometrics» more  ICMI 2007»
15 years 6 months ago
Using the influence model to recognize functional roles in meetings
In this paper, an influence model is used to recognize functional roles played during meetings. Previous works on the same corpus demonstrated a high recognition accuracy using SV...
Wen Dong, Bruno Lepri, Alessandro Cappelletti, Ale...
96
Voted
ACMACE
2008
ACM
15 years 2 months ago
Real binoculars with virtual functions for mixed environments
Though often desirable, the integration of real and virtual elements in mixed reality environments can be difficult. We propose a number of techniques to facilitate scene explorat...
Andrei Sherstyuk, Kin Lik Wang, Anton Treskunov, J...