Sciweavers

18918 search results - page 3635 / 3784
» Using Technology in Teaching
Sort
View
ISW
2009
Springer
15 years 11 months ago
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
The frequency and severity of a number of recent intrusions involving data theft and leakages has shown that online users’ trust, voluntary or not, in the ability of third partie...
Matthew Burnside, Angelos D. Keromytis
RAID
2009
Springer
15 years 11 months ago
VirusMeter: Preventing Your Cellphone from Spies
Due to the rapid advancement of mobile communication technology, mobile devices nowadays can support a variety of data services that are not traditionally available. With the growi...
Lei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen
SPIRE
2009
Springer
15 years 11 months ago
k2-Trees for Compact Web Graph Representation
The directed graph representation of the World Wide Web has been extensively used to analyze the Web structure, behavior and evolution. However, those graphs are huge and do not ď...
Nieves R. Brisaboa, Susana Ladra, Gonzalo Navarro
ACMACE
2009
ACM
15 years 11 months ago
Running or gaming
We developed Exertainer, a sensor-enabled, interactive running entertainment system to support advanced exercise applications. We designed Exertainer to be used in urban environme...
Miru Ahn, Sungjun Kwon, Byunglim Park, Kyungmin Ch...
ACMACE
2009
ACM
15 years 11 months ago
Power explorer: a casual game style for encouraging long term behavior change among teenagers
When it comes to motivating teenagers towards energy awareness, new approaches need to be considered. One such is the use of pervasive games connected to the players own energy co...
Anton Gustafsson, Magnus Bång, Mattias Svahn
« Prev « First page 3635 / 3784 Last » Next »