Sciweavers

14704 search results - page 2656 / 2941
» computing 2007
Sort
View
ECRIME
2007
15 years 8 months ago
Behavioral response to phishing risk
Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
EMNETS
2007
15 years 8 months ago
Sensor node localisation using a stereo camera rig
In this paper, we use stereo vision processing techniques to detect and localise sensors used for monitoring simulated environmental events within an experimental sensor network t...
Dermot Diamond, Noel E. O'Connor, Alan F. Smeaton,...
EMNETS
2007
15 years 8 months ago
Acoustic laptops as a research enabler
The Acoustic ENSBox [1] is an embedded platform which enables practical distributed acoustic sensing by providing integrated hardware and software support in a single platform. It...
Michael Allen, Lewis Girod, Deborah Estrin
ENTER
2007
Springer
15 years 8 months ago
Developing Web-Based Tourist Information Tools Using Google Map
This paper reports an explanatory study of using Google Map API to develop two destinationspecific tourist information tools: a handheld tour guide and an online trip planner for ...
Bing Pan, John C. Crotts, Brian Muller
CANDT
2009
15 years 8 months ago
Analyzing (social media) networks with NodeXL
We present NodeXL, an extendible toolkit for network overview, discovery and exploration implemented as an add-in to the Microsoft Excel 2007 spreadsheet software. We demonstrate ...
Marc A. Smith, Ben Shneiderman, Natasa Milic-Frayl...
« Prev « First page 2656 / 2941 Last » Next »