Sciweavers

219 search results - page 6 / 44
» How useful are your comments
Sort
View
WISEC
2010
ACM
13 years 7 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
ECAL
2007
Springer
14 years 1 months ago
Adapting to Your Body
Abstract. This paper investigates the processes used by an evolved, embodied simulated agent to adapt to large disruptive changes in its sensor morphology, whilst maintaining perfo...
Peter Fine, Ezequiel A. Di Paolo, Eduardo Izquierd...
CAD
2006
Springer
13 years 7 months ago
Parametric interpolation using sampled data
, and of course, you have the option to download any article straight to your desktop, depending on your access rights. Read more about how the TOP 25 is generated and what it refl...
Soon Yong Jeong, Yun Jong Choi, PooGyeon Park
CHI
2008
ACM
14 years 7 months ago
Your place or mine?: visualization as a community component
Many Eyes is a web site that provides collaborative visualization services, allowing users to upload data sets, visualize them, and comment on each other's visualizations. Th...
Catalina M. Danis, Fernanda B. Viégas, Jess...
AAAI
2007
13 years 9 months ago
A Temporal Mereology for Distinguishing between Integral Objects and Portions of Stuff
We develop a formal theory of mereology that includes relations that change over time. We show how this theory formalizes reasoning over domains of material objects, which include...
Thomas Bittner, Maureen Donnelly