Sciweavers

7416 search results - page 1258 / 1484
» Design of an Anatomy Information System
Sort
View
SOUPS
2010
ACM
14 years 4 days ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
NSDI
2007
13 years 10 months ago
A Systematic Framework for Unearthing the Missing Links: Measurements and Impact
The lack of an accurate representation of the Internet topology at the Autonomous System (AS) level is a limiting factor in the design, simulation, and modeling efforts in inter-d...
Yihua He, Georgos Siganos, Michalis Faloutsos, Sri...
AVI
2010
13 years 9 months ago
iChase: supporting exploration and awareness of editing activities on Wikipedia
To increase its credibility and preserve the trust of its readers, Wikipedia needs to ensure a good quality of its articles. To that end, it is critical for Wikipedia administrato...
Nathalie Henry Riche, Bongshin Lee, Fanny Chevalie...
HUC
2010
Springer
13 years 9 months ago
MoviPill: improving medication compliance for elders using a mobile persuasive social game
Medication compliance is a critical component in the success of any medical treatment. However, only 50% of patients correctly adhere to their prescription regimens. Mobile and ub...
Rodrigo de Oliveira, Mauro Cherubini, Nuria Oliver
CCR
2002
113views more  CCR 2002»
13 years 8 months ago
A secure multicast protocol with copyright protection
We present a simple, efficient, and secure multicast protocol with copyright protection in an open and insecure network environment. There is a wide variety of multimedia applicat...
Hao-Hua Chu, Lintian Qiao, Klara Nahrstedt, Hua Wa...
« Prev « First page 1258 / 1484 Last » Next »