Sciweavers

7383 search results - page 1434 / 1477
» Theories of information behavior
Sort
View
ACSAC
2009
IEEE
15 years 4 months ago
FIRE: FInding Rogue nEtworks
For many years, online criminals have been able to conduct their illicit activities by masquerading behind disreputable Internet Service Providers (ISPs). For example, organizatio...
Brett Stone-Gross, Christopher Kruegel, Kevin C. A...
AINA
2009
IEEE
15 years 4 months ago
Toward fMRI Group Identification Based on Brain Lateralization
— This research presents a novel application of Lateralization Index (LI) in support of a decision making process for the classification of subjects based on their brain activati...
Magno R. Guillen, Malek Adjouadi, Xiaozhen You, Ar...
IEEEARES
2009
IEEE
15 years 4 months ago
Generating User-Understandable Privacy Preferences
—Making use of the World Wide Web’s numerous services increasingly requires the disclosure of personal user data. While these data represent an important value for service prov...
Jan Kolter, Günther Pernul
ISBI
2009
IEEE
15 years 4 months ago
Image-Driven Population Analysis Through Mixture Modeling
—We present iCluster, a fast and efficient algorithm that clusters a set of images while co-registering them using a parameterized, nonlinear transformation model. The output of...
Mert R. Sabuncu
OZCHI
2009
ACM
15 years 4 months ago
Brute force interactions: leveraging intense physical actions in gaming
People use a wide range of intensity when interacting with computers, spanning from subtle to brute force. However, computer interfaces so far have mainly focused on interactions ...
Florian Mueller, Stefan Agamanolis, Frank Vetere, ...
« Prev « First page 1434 / 1477 Last » Next »