Sciweavers

548 search results - page 88 / 110
» Computation of Shape Through Controlled Active Exploration
Sort
View
MOBICOM
2012
ACM
11 years 10 months ago
Distinguishing users with capacitive touch communication
As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In t...
Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Ric...
RAID
2004
Springer
14 years 1 months ago
On the Design and Use of Internet Sinks for Network Abuse Monitoring
Abstract. Monitoring unused or dark IP addresses offers opportunities to significantly improve and expand knowledge of abuse activity without many of the problems associated with ...
Vinod Yegneswaran, Paul Barford, David Plonka
COBUILD
1999
Springer
13 years 12 months ago
Matching Information and Ambient Media
Ambient media have recently been introduced as a means to present information in our surrounding space in subtle and unmonopolizing ways, promoting peripheral awareness. This paper...
Albrecht Schmidt, Hans-Werner Gellersen, Michael B...
AVI
2006
13 years 9 months ago
Evaluating the effects of fluid interface components on tabletop collaboration
Tabletop displays provide exciting opportunities to support individual and collaborative activities such as planning, organizing, and storyboarding. It has been previously suggest...
Uta Hinrichs, M. Sheelagh T. Carpendale, Stacey D....
NDSS
2008
IEEE
14 years 2 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters