Sciweavers

1663 search results - page 143 / 333
» Computer Security in the Real World
Sort
View
MOBIHOC
2003
ACM
16 years 3 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong
ISI
2006
Springer
15 years 3 months ago
Collective Sampling and Analysis of High Order Tensors for Chatroom Communications
This work investigates the accuracy and efficiency tradeoffs between centralized and collective (distributed) algorithms for (i) sampling, and (ii) n-way data analysis techniques i...
Evrim Acar, Seyit Ahmet Çamtepe, Bülen...
SI3D
1997
ACM
15 years 8 months ago
Managing Latency in Complex Augmented Reality Systems
Registration (or alignment) of the synthetic imagery with the real world is crucial in augmented reality (AR) systems. The data from user-input devices, tracking devices, and imag...
Marco C. Jacobs, Mark A. Livingston, Andrei State
CHI
2011
ACM
14 years 7 months ago
Active reading and its discontents: the situations, problems and ideas of readers
The increasing popularity of personal reading devices raises the question of how best to support so-called active reading, which involves acts like annotation, note taking, etc. P...
Craig S. Tashman, W. Keith Edwards
SC
2005
ACM
15 years 9 months ago
Identity Boxing: A New Technique for Consistent Global Identity
Today, users of the grid may easily authenticate themselves to computing resources around the world using a public key security infrastructure. However, users are forced to employ...
Douglas Thain