Sciweavers

7839 search results - page 1491 / 1568
» What's Clicking What
Sort
View
85
Voted
IJSN
2006
65views more  IJSN 2006»
15 years 22 days ago
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
: In order to conceal their identity and origin, network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate `stepping ...
Xinyuan Wang
102
Voted
CORR
2007
Springer
135views Education» more  CORR 2007»
15 years 22 days ago
AMIEDoT: An annotation model for document tracking and recommendation service
The primary objective of document annotation in whatever form, manual or electronic is to allow those who may not have control to original document to provide personal view on inf...
Charles A. Robert
104
Voted
CORR
2007
Springer
127views Education» more  CORR 2007»
15 years 22 days ago
Using decision problems in public key cryptography
There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by no...
Vladimir Shpilrain, Gabriel Zapata
IJVR
2006
116views more  IJVR 2006»
15 years 22 days ago
New Directions in 3D User Interfaces
Three-dimensional user interfaces (3D UIs) support user tasks in many non-traditional interactive systems such as virtual environments, augmented reality, and ubiquitous computing...
Doug A. Bowman, Jian Chen, Chadwick A. Wingrave, J...
106
Voted
JCIT
2008
93views more  JCIT 2008»
15 years 22 days ago
A search quality evaluation based on objective-subjective method
Commercial search engines, especially meta-search engines was designed to retrieve the information by submitting users' queries to multiple conventional search engines and in...
Fugui Wang, Yajun Du, Qinhua Dong
« Prev « First page 1491 / 1568 Last » Next »