Sciweavers

1573 search results - page 200 / 315
» Strong User Authentication
Sort
View
VISUALIZATION
2002
IEEE
15 years 6 months ago
Kinetic Visualization - A Technique for Illustrating 3D Shape and Structure
Motion provides strong visual cues for the perception of shape and depth, as demonstrated by cognitive scientists and visual artists. This paper presents a novel visualization tec...
Eric B. Lum, Aleksander Stompel, Kwan-Liu Ma
CN
1999
77views more  CN 1999»
15 years 1 months ago
Efficiency Analysis of Brokers in the Electronic Marketplace
In this paper we analyze the behavior of e-commerce users based on actual logs from two large non-English e-brokers. We start by presenting a quantitative study of the behavior of...
Virgilio Almeida, Wagner Meira Jr., Victor F. Ribe...
VLDB
2002
ACM
165views Database» more  VLDB 2002»
15 years 1 months ago
Chip-Secured Data Access: Confidential Data on Untrusted Servers
The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today's natural ...
Luc Bouganim, Philippe Pucheral
ATVA
2010
Springer
93views Hardware» more  ATVA 2010»
14 years 11 months ago
A Specification Logic for Exceptions and Beyond
Exception handling is an important language feature for building more robust software programs. It is primarily concerned with capturing abnormal events, with the help of catch han...
Cristian Gherghina, Cristina David
HCI
2009
14 years 11 months ago
Trust in Online Technology: Towards Practical Guidelines Based on Experimentally Verified Theory
Abstract. A large amount of research attempts to define trust, yet relatively little research attempts to experimentally verify what makes trust needed in interactions with humans ...
Christian Detweiler, Joost Broekens