Sciweavers

3042 search results - page 178 / 609
» Designing for all users: including the odd users
Sort
View
MMNS
2003
113views Multimedia» more  MMNS 2003»
13 years 10 months ago
Secure Inclusion of Phones Into Online E-meetings
Online Internet based e-meetings for synchronous communication is becoming more and more common and the need for secure communication is a strong requirement from both corporate a...
Peter Parnes
ETT
2010
227views Education» more  ETT 2010»
13 years 4 months ago
Throughput enhancement through femto-cell deployment
This paper studies the impact of femto-cell underlay deployment that share radio frequency resources with urban macro-cells. Due to the random and uncoordinated deployment, femto-c...
Zubin Bharucha, Harald Haas, Andreas Saul, Gunther...
ICDE
2009
IEEE
285views Database» more  ICDE 2009»
14 years 11 months ago
Design and Evaluation of the iMed Intelligent Medical Search Engine
-- Searching for medical information on the Web is popular and important. However, medical search has its own unique requirements that are poorly handled by existing medical Web se...
Gang Luo
EDCC
1994
Springer
14 years 1 months ago
Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach
Security and reliability issues in distributed systems have been investigated for several years at LAAS using a technique called Fragmentation-Redundancy-Scattering (FRS). The aim ...
Jean-Charles Fabre, Yves Deswarte, Brian Randell
AIRWEB
2009
Springer
14 years 3 months ago
Tag spam creates large non-giant connected components
Spammers in social bookmarking systems try to mimick bookmarking behaviour of real users to gain the attention of other users or search engines. Several methods have been proposed...
Nicolas Neubauer, Robert Wetzker, Klaus Obermayer