Sciweavers

135 search results - page 20 / 27
» Sesame: informing user security decisions with system visual...
Sort
View
SIGECOM
2005
ACM
130views ECommerce» more  SIGECOM 2005»
15 years 4 months ago
Graceful service degradation (or, how to know your payment is late)
When distributing digital content over a broadcast channel it’s often necessary to revoke users whose access privileges have expired, thus preventing them from recovering the co...
Alexandr Andoni, Jessica Staddon
ICCHP
2004
Springer
15 years 4 months ago
proXimity: Ad-Hoc Networks for Enhanced Mobility
David tries not to use unfamiliar trains and buses, he doesn’t travel to places he doesn’t know, and he doesn’t travel in unusual environments without a companion. David is v...
Simon Harper, Stephen Pettitt, Carole A. Goble
106
Voted
FC
2006
Springer
129views Cryptology» more  FC 2006»
15 years 2 months ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig
VISSYM
2007
15 years 1 months ago
Relevance Driven Visualization of Financial Performance Measures
Visual data analysis has received a lot of research interest in recent years, and a wide variety of new visualization techniques and applications have been developed to improve in...
Hartmut Ziegler, Tilo Nietzschmann, Daniel A. Keim
HPDC
2000
IEEE
15 years 2 months ago
Automatic Configuration and Run-time Adaptation of Distributed Applications
Increased platform heterogeneity and varying resource availability in distributed systems motivates the design of resource-aware applications, which ensure a desired performance l...
Fangzhe Chang, Vijay Karamcheti