Sciweavers

3042 search results - page 130 / 609
» Designing for all users: including the odd users
Sort
View
CORR
2011
Springer
198views Education» more  CORR 2011»
13 years 21 days ago
Decentralized Online Learning Algorithms for Opportunistic Spectrum Access
—The fundamental problem of multiple secondary users contending for opportunistic spectrum access over multiple channels in cognitive radio networks has been formulated recently ...
Yi Gai, Bhaskar Krishnamachari
CN
2006
112views more  CN 2006»
13 years 9 months ago
Optimal server allocations for streaming multimedia applications on the Internet
In this paper, we address the server selection problem for streaming applications on the Internet. The architecture we consider is similar to the content distribution networks con...
Padmavathi Mundur, Poorva Arankalle
CHI
2006
ACM
14 years 9 months ago
Do security toolbars actually prevent phishing attacks?
Security toolbars in a web browser show security-related information about a website to help users detect phishing attacks. Because the toolbars are designed for humans to use, th...
Min Wu, Robert C. Miller, Simson L. Garfinkel
CGF
2006
83views more  CGF 2006»
13 years 9 months ago
Seamless Integration of Initial Sketching and Subsequent Detail Editing in Flower Modeling
We present an interactive modeling system for flower composition that supports seamless transformation from an initial sketch to a detailed three-dimensional (3D) model. To begin,...
Takashi Ijiri, Shigeru Owada, Takeo Igarashi
ACSAC
2003
IEEE
14 years 2 months ago
Security Design in Online Games
The emergence of online games has fundamentally changed security requirements for computer games, which previously were largely concerned with copy protection. In this paper, we e...
Jeff Jianxin Yan