Sciweavers

557 search results - page 43 / 112
» Two experiences designing for effective security
Sort
View
AAAI
1996
15 years 1 months ago
Source Selection for Analogical Reasoning: An Empirical Approach
of it suffer from a number of limitations, including: The effectiveness of an analogical reasoner depends upon its ability to select a relevant analogical source. In many problem d...
William A. Stubblefield, George F. Luger
TOCHI
2002
63views more  TOCHI 2002»
14 years 11 months ago
Rivalry and interference with a head-mounted display
Perceptual factors that effect monocular, transparent (a.k.a "see-thru") head mounted displays include binocular rivalry, visual interference, and depth of focus. We rep...
Robert S. Laramee, Colin Ware
MM
2005
ACM
126views Multimedia» more  MM 2005»
15 years 5 months ago
A corpus-based singing voice synthesis system for mandarin Chinese
In this paper, the design and implementation of a corpus-based singing voice synthesis (SVS) system for Mandarin Chinese was introduced. The design rules of three corpora for sing...
Cheng-Yuan Lin, Tzu-Ying Lin, Jyh-Shing Roger Jang
SIGCOMM
2012
ACM
13 years 2 months ago
Abstractions for network update
ions for Network Update Mark Reitblatt Cornell Nate Foster Cornell Jennifer Rexford Princeton Cole Schlesinger Princeton David Walker Princeton Configuration changes are a common...
Mark Reitblatt, Nate Foster, Jennifer Rexford, Col...
ACSAC
2006
IEEE
15 years 3 months ago
Data Sandboxing: A Technique for Enforcing Confidentiality Policies
When an application reads private / sensitive information and subsequently communicates on an output channel such as a public file or a network connection, how can we ensure that ...
Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakri...