Sciweavers

7047 search results - page 1330 / 1410
» Focusing on Binding and Computation
Sort
View
SASN
2006
ACM
14 years 2 months ago
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
This paper focuses on defending against compromised nodes’ dropping of legitimate reports and investigates the misbehavior of a maliciously packet-dropping node in sensor networ...
Suk-Bok Lee, Yoon-Hwa Choi
SOUPS
2006
ACM
14 years 2 months ago
Seeing further: extending visualization as a basis for usable security
The focus of our approach to the usability considerations of privacy and security has been on providing people with information they can use to understand the implications of thei...
Jennifer Ann Rode, Carolina Johansson, Paul DiGioi...
UIST
2006
ACM
14 years 2 months ago
CueTIP: a mixed-initiative interface for correcting handwriting errors
With advances in pen-based computing devices, handwriting has become an increasingly popular input modality. Researchers have put considerable effort into building intelligent rec...
Michael Shilman, Desney S. Tan, Patrice Simard
WPES
2006
ACM
14 years 2 months ago
Measuring relationship anonymity in mix networks
Many applications of mix networks such as anonymous Web browsing require relationship anonymity: it should be hard for the attacker to determine who is communicating with whom. Co...
Vitaly Shmatikov, Ming-Hsiu Wang
CIBCB
2005
IEEE
14 years 2 months ago
Toward Protein Structure Analysis with Self-Organizing Maps
- Establishing structure-function relationships on the proteomic scale is a unique challenge faced by bioinformatics and molecular biosciences. Large protein families represent nat...
Lutz Hamel, Gongqin Sun, Jing Zhang
« Prev « First page 1330 / 1410 Last » Next »