Sciweavers

1818 search results - page 347 / 364
» How users use access control
Sort
View
SOUPS
2009
ACM
14 years 3 months ago
Balancing usability and security in a video CAPTCHA
We present a technique for using content-based video labeling as a CAPTCHA task. Our CAPTCHAs are generated from YouTube videos, which contain labels (tags) supplied by the person...
Kurt Alfred Kluever, Richard Zanibbi
PIMRC
2008
IEEE
14 years 3 months ago
Self-organized spatial reuse scheduling in multihop cellular systems
Multihop cellular systems using fixed relay stations are the most promising candidate in the next generation of cellular systems. In order to maximize multihop transmission gains, ...
Chungha Koh, Kang Jin Yoon, Kyung-Ho Sohn, Suji Mo...
MOBICOM
2005
ACM
14 years 2 months ago
Self-management in chaotic wireless deployments
Over the past few years, wireless networking technologies have made vast forays into our daily lives. Today, one can find 802.11 hardware and other personal wireless technology e...
Aditya Akella, Glenn Judd, Srinivasan Seshan, Pete...
PDC
2004
ACM
14 years 2 months ago
Participatory design in community computing contexts: tales from the field
As technology becomes more embedded in our daily lives, there is a great deal of hope about the use of information technology to achieve positive community outcomes like increasin...
Cecelia Merkel, Lu Xiao, Umer Farooq, Craig H. Gan...
BMCBI
2007
104views more  BMCBI 2007»
13 years 9 months ago
TISs-ST: a web server to evaluate polymorphic translation initiation sites and their reflections on the secretory targets
Background: The nucleotide sequence flanking the translation initiation codon (start codon context) affects the translational efficiency of eukaryotic mRNAs, and may indicate the ...
Renato Vicentini, Marcelo Menossi