Sciweavers

903 search results - page 140 / 181
» Usability inspection methods
Sort
View
ICIP
2005
IEEE
15 years 11 months ago
Correlation estimation for distributed source coding under information exchange constraints
Distributed source coding (DSC) depends strongly on accurate knowledge of correlation between sources. Previous works have reported capacity-approaching code constructions when ex...
Ngai-Man Cheung, Huisheng Wang, Antonio Ortega
VIS
2004
IEEE
156views Visualization» more  VIS 2004»
15 years 11 months ago
Force-Feedback-Enhanced Navigation for Interactive Visualization of Coronary Vessels
Coronary heart disease (CHD) is the number one killer in the United States. Although it is well known that CHD mainly occurs due to blocked arteries, there are contradictory resul...
Thomas Wischgoll, Elke Moritz, Jörg Meyer
WWW
2006
ACM
15 years 10 months ago
Protecting browser state from web privacy attacks
Through a variety of means, including a range of browser cache methods and inspecting the color of a visited hyperlink, client-side browser state can be exploited to track users a...
Collin Jackson, Andrew Bortz, Dan Boneh, John C. M...
86
Voted
ICC
2009
IEEE
115views Communications» more  ICC 2009»
15 years 4 months ago
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace
—Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, ...
Tobias Heer, René Hummen, Miika Komu, Stefa...
INFOCOM
2009
IEEE
15 years 4 months ago
Quantifying the Importance of Vantage Points Distribution in Internet Topology Measurements
—The topology of the Internet has been extensively studied in recent years, driving a need for increasingly complex measurement infrastructures. These measurements have produced ...
Yuval Shavitt, Udi Weinsberg