Sciweavers

195 search results - page 27 / 39
» Analyzing Online Information Privacy Concerns: An Informatio...
Sort
View
ISPW
2005
IEEE
14 years 1 months ago
Evolving Defect "Folklore": A Cross-Study Analysis of Software Defect Behavior
Abstract. Answering “macro-process” research issues – which require understanding how development processes fit or do not fit in different organizational systems and environm...
Victor R. Basili, Forrest Shull
AGENTS
2001
Springer
14 years 4 days ago
Monitoring deployed agent teams
Recent years are seeing an increasing need for on-line monitoring of deployed distributed teams of cooperating agents, e.g., for visualization, or performance tracking. However, i...
Gal A. Kaminka, David V. Pynadath, Milind Tambe
ACSAC
2008
IEEE
14 years 2 months ago
New Side Channels Targeted at Passwords
Side channels are typically viewed as attacks that leak cryptographic keys during cryptographic algorithm processing, by observation of system side effects. In this paper, we pres...
Albert Tannous, Jonathan T. Trostle, Mohamed Hassa...
ICIP
2006
IEEE
14 years 9 months ago
Studying Temporal Correlation Noise Modeling for Pixel Based Wyner-Ziv Video Coding
Wyner-Ziv (WZ) video coding ? a particular case of distributed video coding (DVC) ? is a new video coding paradigm based on two major Information Theory results: the Slepian-Wolf ...
Catarina Brites, Fernando Pereira, João Asc...
CHI
2008
ACM
14 years 8 months ago
The network in the garden: an empirical analysis of social media in rural life
History repeatedly demonstrates that rural communities have unique technological needs. Yet, we know little about how rural communities use modern technologies, so we lack knowled...
Eric Gilbert, Karrie Karahalios, Christian Sandvig