Sciweavers

1686 search results - page 252 / 338
» Artful systems in the home
Sort
View
WISEC
2010
ACM
13 years 10 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
CSCW
2006
ACM
13 years 10 months ago
Loose Coupling and Healthcare Organizations: Deployment Strategies for Groupware
Healthcare organizations are often organized in a modular, loosely coupled fashion where separate and semi-autonomous work units specialize in different areas of care delivery. Thi...
David Pinelle, Carl Gutwin
EOR
2006
72views more  EOR 2006»
13 years 10 months ago
Experimental tour-based travel demand models
CT In this paper some experimental sequential models for the simulation of trip-chains are presented; the models have been calibrated on the base of a survey made in a medium-sized...
Demetrio C. Festa, Daniela Condino, Gabriella Mazz...
JCP
2008
119views more  JCP 2008»
13 years 10 months ago
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware
With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent con...
Omar S. Elkeelany, Adegoke Olabisi
CVPR
2009
IEEE
15 years 5 months ago
Holistic Context Modeling using Semantic Co-occurrences
We present a simple framework to model contextual relationships between visual concepts. The new framework combines ideas from previous object-centric methods (which model conte...
Nikhil Rasiwasia (University Of California, San Di...