Sciweavers

396 search results - page 46 / 80
» Designing and deploying an information awareness interface
Sort
View
CHI
2011
ACM
13 years 12 days ago
Guess who?: enriching the social graph through a crowdsourcing game
Despite the tremendous popularity of social network sites both on the web and within enterprises, the relationship information they contain may be often incomplete or outdated. We...
Ido Guy, Adam Perer, Tal Daniel, Ohad Greenshpan, ...
CHI
2004
ACM
14 years 9 months ago
Orchestrating a mixed reality game 'on the ground'
Successfully staging a mixed reality game in which online players are chased through a virtual city by runners located in the real world requires extensive orchestration work. An ...
Andy Crabtree, Steve Benford, Tom Rodden, Chris Gr...
SECURWARE
2007
IEEE
14 years 3 months ago
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Jorge Belenguer, Carlos Miguel Tavares Calafate
PDIS
1996
IEEE
14 years 1 months ago
Querying the World Wide Web
The World Wide Web is a large, heterogeneous, distributedcollectionof documents connected by hypertext links. The most common technologycurrently used for searching the Web depend...
Alberto O. Mendelzon, George A. Mihaila, Tova Milo
CHI
2008
ACM
14 years 9 months ago
Ubipay: conducting everyday payments with minimum user involvement
As services embedded into public spaces become increasingly transparent, one peripheral aspect of use continues to demand explicit user attention: payment. UbiPay is a system that...
Vili Lehdonvirta, Hayuru Soma, Hitoshi Ito, Hiroak...