Sciweavers

32 search results - page 6 / 7
» Trusting Online: Nurturing Trust in Virtual Teams
Sort
View
96
Voted
CIARP
2003
Springer
15 years 2 months ago
Online Handwritten Signature Verification Using Hidden Markov Models
Most people are used to signing documents and because of this, it is a trusted and natural method for user identity verification, reducing the cost of password maintenance and decr...
Juan J. Igarza, Iñaki Goirizelaia, Koldo Es...
SOSP
2007
ACM
15 years 6 months ago
Secure virtual architecture: a safe execution environment for commodity operating systems
This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. The approach...
John Criswell, Andrew Lenharth, Dinakar Dhurjati, ...
IJET
2007
214views more  IJET 2007»
14 years 9 months ago
Employing Collaborative Learning Strategies in Online Conflict Resolution
—Although some critics may argue that conflict resolution cannot be carried out appropriately by virtual education, the basic elements of conflict present themselves within dista...
Samir Abou El-Seoud, Carme Anguera Iglesias, Marga...
CHI
2008
ACM
15 years 10 months ago
Lifting the veil: improving accountability and social transparency in Wikipedia with wikidashboard
Wikis are collaborative systems in which virtually anyone can edit anything. Although wikis have become highly popular in many domains, their mutable nature often leads them to be...
Bongwon Suh, Ed H. Chi, Aniket Kittur, Bryan A. Pe...
ACSAC
1999
IEEE
15 years 1 months ago
Safe Areas of Computation for Secure Computing with Insecure Applications
Currently the computer systems and software used by the average user offer virtually no security. Because of this many attacks, both simulated and real, have been described by the...
André L. M. dos Santos, Richard A. Kemmerer