Sciweavers

5693 search results - page 1008 / 1139
» Socially relevant computing
Sort
View
DRM
2006
Springer
15 years 5 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
GD
2006
Springer
15 years 5 months ago
The Website for Graph Visualization Software References (GVSR)
Graph drawing software are now commonly used. However, the choice of a well-adapted program may be hard for an inexperienced user. This poster presents a website (http://www.polyte...
Bruno Pinaud, Pascale Kuntz, Fabien Picarougne
APGV
2010
ACM
236views Visualization» more  APGV 2010»
15 years 4 months ago
The effect of stereo and context on memory and awareness states in immersive virtual environments
Spatial awareness is crucial for human performance efficiency of any task that entails perception of space. Memory of spaces is an imperfect reflection of the cognitive activity (...
Adam Bennett, Matthew Coxon, Katerina Mania
ATAL
2008
Springer
15 years 3 months ago
Anonymity-proof Shapley value: extending shapley value for coalitional games in open environments
Coalition formation is an important capability for automated negotiation among self-interested agents. In order for coalitions to be stable, a key question that must be answered i...
Naoki Ohta, Vincent Conitzer, Yasufumi Satoh, Atsu...
CCS
2008
ACM
15 years 3 months ago
A look in the mirror: attacks on package managers
This work studies the security of ten popular package managers. These package managers use different security mechanisms that provide varying levels of usability and resilience to...
Justin Cappos, Justin Samuel, Scott M. Baker, John...
« Prev « First page 1008 / 1139 Last » Next »