Sciweavers

694 search results - page 47 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
ISI
2006
Springer
14 years 11 months ago
Strategic Intelligence Analysis: From Information Processing to Meaning-Making
Strategic intelligence involves the efforts to understand the "Big Picture" emerging from data sources. Concerning textual data, this process involves the extraction of m...
Yair Neuman, Liran Elihay, Meni Adler, Yoav Goldbe...
PERCOM
2011
ACM
14 years 3 months ago
On-body device localization for health and medical monitoring applications
—We present a technique to discover the position of sensors on the human body. Automatic on-body device localization ensures correctness and accuracy of measurements in health an...
Alireza Vahdatpour, Navid Amini, Majid Sarrafzadeh
CCS
2009
ACM
15 years 3 months ago
The bayesian traffic analysis of mix networks
This work casts the traffic analysis of anonymity systems, and in particular mix networks, in the context of Bayesian inference. A generative probabilistic model of mix network ar...
Carmela Troncoso, George Danezis
NORDICHI
2006
ACM
15 years 5 months ago
The FaceReader: measuring instant fun of use
Recently, more and more attention has been paid to emotions in the domain of Human-Computer Interaction. When evaluating a product, one can no longer ignore the emotions a product...
Bieke Zaman, Tara Shrimpton-Smith
IPPS
2009
IEEE
15 years 6 months ago
Implementing and evaluating multithreaded triad census algorithms on the Cray XMT
Commonly represented as directed graphs, social networks depict relationships and behaviors among social entities such as people, groups, and organizations. Social network analysi...
George Chin Jr., Andrès Márquez, Sut...