Sciweavers

33 search results - page 6 / 7
» From the certainty of information transfer to the ambiguity ...
Sort
View
JCDL
2010
ACM
188views Education» more  JCDL 2010»
14 years 5 days ago
Exposing the hidden web for chemical digital libraries
In recent years, the vast amount of digitally available content has lead to the creation of many topic-centered digital libraries. Also in the domain of chemistry more and more di...
Sascha Tönnies, Benjamin Köhncke, Oliver...
TVCG
2010
142views more  TVCG 2010»
13 years 5 months ago
Illustrative Volume Visualization Using GPU-Based Particle Systems
—Illustrative techniques are generally applied to produce stylized renderings. Various illustrative styles have been applied to volumetric data sets, producing clearer images and...
Roy van Pelt, Anna Vilanova, Huub van de Wetering
CSFW
2003
IEEE
14 years 12 days ago
A Procedure for Verifying Security Against Type Confusion Attacks
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather et al. that there are simple formatting conv...
Catherine Meadows
CHI
2009
ACM
14 years 7 months ago
Natural throw and tilt interaction between mobile phones and distant displays
Raimund Dachselt University of Magdeburg Faculty of Computer Science User Interface & Software Engineering Group 39106 Magdeburg, Germany dachselt@acm.org Robert Buchholz Unive...
Raimund Dachselt, Robert Buchholz
SIGECOM
2004
ACM
104views ECommerce» more  SIGECOM 2004»
14 years 16 days ago
An economic answer to unsolicited communication
We explore an alternative approach to spam based on economic rather than technological or regulatory screening mechanisms. We employ a model of email value which supports two intu...
Thede Loder, Marshall W. van Alstyne, Rick Wash