Sciweavers

595 search results - page 65 / 119
» A Review of Groupware Evaluations
Sort
View
PET
2005
Springer
14 years 1 months ago
Message Splitting Against the Partial Adversary
We review threat models used in the evaluation of anonymity systems’ vulnerability to traffic analysis. We then suggest that, under the partial adversary model, if multiple packe...
Andrei Serjantov, Steven J. Murdoch
APGV
2004
ACM
124views Visualization» more  APGV 2004»
14 years 1 months ago
Image appearance modeling and high-dynamic-range image rendering
Recently, the field of color appearance modeling has been extended further into the spatial and temporal domains through efforts known as image appearance modeling. Image appearan...
Mark D. Fairchild, Garrett M. Johnson, Jiangtao Ku...
FMCO
2004
Springer
112views Formal Methods» more  FMCO 2004»
14 years 1 months ago
Probabilistic Linda-Based Coordination Languages
Abstract. Coordination languages are intended to simplify the development of complex software systems by separating the coordination aspects of an application from its computation ...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...
ICCBSS
2004
Springer
14 years 1 months ago
A Wish List for Requirements Engineering for COTS-Based Information Systems
This paper summarizes the main achievements of a research whose main goal was to investigate the current state-of-art in the field of requirements engineering for COTS-based system...
Vito Perrone
MHCI
2004
Springer
14 years 1 months ago
Mobile Support for Team-Based Field Surveys
This paper describes a study of the use of multimedia networked location-aware mobile computers to support team-based survey-oriented fieldwork. Existing systems do not provide ful...
Malcolm Hall, Philip D. Gray