Sciweavers

8030 search results - page 1474 / 1606
» User Interface
Sort
View
132
Voted
IPPS
2007
IEEE
15 years 9 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
119
Voted
IPPS
2007
IEEE
15 years 9 months ago
High Performance Java Sockets for Parallel Computing on Clusters
The use of Java for parallel programming on clusters relies on the need of efficient communication middleware and high-speed cluster interconnect support. Nevertheless, currently...
Guillermo L. Taboada, Juan Touriño, Ramon D...
ISCC
2007
IEEE
211views Communications» more  ISCC 2007»
15 years 9 months ago
High Performance Java Remote Method Invocation for Parallel Computing on Clusters
This paper presents a more efficient Java Remote Method Invocation (RMI) implementation for high-speed clusters. The use of Java for parallel programming on clusters is limited b...
Guillermo L. Taboada, Carlos Teijeiro, Juan Touri&...
SMI
2007
IEEE
136views Image Analysis» more  SMI 2007»
15 years 9 months ago
Realistic Hair from a Sketch
This paper explores a sketch-based interface for quickly yet accurately creating visually realistic hair for virtual characters. Recently, physically-based models have proved succ...
Jamie Wither, Florence Bertails, Marie-Paule Cani
122
Voted
SP
2007
IEEE
110views Security Privacy» more  SP 2007»
15 years 9 months ago
A Systematic Approach to Uncover Security Flaws in GUI Logic
To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the human-computer interface is compromised. GUI logic flaws ...
José Meseguer, Ralf Sasse, Helen J. Wang, Y...
« Prev « First page 1474 / 1606 Last » Next »