Sciweavers

548 search results - page 94 / 110
» An authorization and access control scheme for pervasive com...
Sort
View
CHI
2008
ACM
13 years 11 months ago
Do visualizations improve synchronous remote collaboration?
Information visualizations can improve collaborative problem solving, but this improvement may depend on whether visualizations promote communication. In an experiment on the effe...
Aruna D. Balakrishnan, Susan R. Fussell, Sara B. K...
TAPSOFT
1995
Springer
14 years 17 days ago
Comparing Flow-Based Binding-Time Analyses
Abstract. Binding-time analyses based on flow analysis have been presented by Bondorf, Consel, Bondorf and Jørgensen, and Schwartzbach and the present author. The analyses are fo...
Jens Palsberg
GCC
2003
Springer
14 years 2 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
ECRIME
2007
14 years 29 days ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
WIOPT
2006
IEEE
14 years 3 months ago
Analytical modeling of ad hoc networks that utilize space-time coding
— This paper presents the first analytical model for ad hoc networks equipped with multiple-input multiple-output (MIMO) radios using space-time coding (STC) that considers the ...
Marcelo M. Carvalho, J. J. Garcia-Luna-Aceves