Sciweavers

694 search results - page 119 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
CCS
2009
ACM
15 years 4 months ago
Behavior based software theft detection
Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which re...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
JCP
2008
119views more  JCP 2008»
14 years 9 months ago
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware
With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent con...
Omar S. Elkeelany, Adegoke Olabisi
CHI
2009
ACM
15 years 4 months ago
O' game, can you feel my frustration?: improving user's gaming experience via stresscam
One of the major challenges of video game design is to have appropriate difficulty levels for users in order to maximize the entertainment value of the game. Game players may lose...
Chang Yun, Dvijesh Shastri, Ioannis Pavlidis, Zhig...
DOLAP
2006
ACM
15 years 1 months ago
Building a web warehouse for accessibility data
As more and more information is available on the web, it is a problem that many web resources are not accessible, i.e., are not usable for users with special needs. For example, f...
Christian Thomsen, Torben Bach Pedersen
108
Voted
NDQA
2003
156views Education» more  NDQA 2003»
14 years 11 months ago
Toward a Question Answering Roadmap
Growth in government investment, academic research, and commercial question answering (QA) systems is motivating a need for increased planning and coordination. The internationali...
Mark T. Maybury