Sciweavers

2663 search results - page 196 / 533
» The Design, Implementation, and Evaluation of Jade
Sort
View
CHI
2008
ACM
15 years 11 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
EUROSYS
2007
ACM
15 years 8 months ago
Fine grained kernel logging with KLogger: experience and insights
Understanding the detailed behavior of an operating system is crucial for making informed design decisions. But such an understanding is very hard to achieve, due to the increasin...
Yoav Etsion, Dan Tsafrir, Scott Kirkpatrick, Dror ...
ICDCS
2008
IEEE
15 years 5 months ago
Sensor Node Localization Using Uncontrolled Events
Many event-driven localization methods have been proposed as low cost, energy efficient solutions for wireless senor networks. In order to eliminate the requirement of accurately...
Ziguo Zhong, Dan Wang, Tian He
SOFSEM
2007
Springer
15 years 5 months ago
Personalized Presentation in Web-Based Information Systems
Abstract. Large information spaces and complex functionality of contemporary systems together with the advent of the Semantic Web are big challenges for the design of simple yet po...
Michal Tvarozek, Michal Barla, Mária Bielik...
ICMCS
2006
IEEE
129views Multimedia» more  ICMCS 2006»
15 years 4 months ago
Media Synchronization Method for Video Hypermedia Application Based on Extended Event Model
This paper describes a proposal of an extended event model using a media synchronization method for video hypermedia applications. In this extended event model, video and metadata...
Hironobu Abe, Hiroshi Shigeno, Ken-ichi Okada