Sciweavers

5722 search results - page 314 / 1145
» Security Function Interactions
Sort
View
104
Voted
MANSCI
2007
70views more  MANSCI 2007»
15 years 3 months ago
Optimal Risk Taking with Flexible Income
We study the portfolio selection problem of an investor who can optimally exert costly effort for more income. The possibility of generating more income, if necessary, increases ...
Jaksa Cvitanic, Levon Goukasian, Fernando Zapatero
134
Voted
CSREASAM
2010
15 years 1 months ago
Geotagging Where Cyberspace Comes to Your Place
- The combination of GPS services and information technology is increasing with the use of geotagging now occurring as a default action in many commodity based devices functionalit...
Craig Valli, Peter Hannay
CHI
2009
ACM
16 years 4 months ago
Tilt techniques: investigating the dexterity of wrist-based input
Most studies on tilt based interaction can be classified as point-designs that demonstrate the utility of wrist-tilt as an input medium; tilt parameters are tailored to suit the s...
Mahfuz Rahman, Sean Gustafson, Pourang Irani, Srir...
100
Voted
WKDD
2008
CPS
97views Data Mining» more  WKDD 2008»
15 years 10 months ago
Knowledge Management in the Ubiquitous Software Development
The continuous technical advances have lead to the proliferation of very small and very cheap microprocessors, equipped with sensors and capacity of wireless communication. The in...
José Miguel Rubio León
116
Voted
PERCOM
2008
ACM
16 years 3 months ago
A tamper-proof and lightweight authentication scheme
We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, w...
Ghaith Hammouri, Erdinç Öztürk, Berk Sunar