Sciweavers

139 search results - page 16 / 28
» Information flow using edge stress factor
Sort
View
CHI
2011
ACM
12 years 10 months ago
TorusDesktop: pointing via the backdoor is sometimes shorter
When pointing to a target on a computer desktop, we may think we are taking the shortest possible path. But new shortcuts become possible if we allow the mouse cursor to jump from...
Stéphane Huot, Olivier Chapuis, Pierre Drag...
ESORICS
2008
Springer
13 years 8 months ago
Security Provisioning in Pervasive Environments Using Multi-objective Optimization
Pervasive computing applications involve information flow across multiple organizations. Thus, any security breach in an application can have far-reaching consequences. However, ef...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...
NPAR
2000
ACM
13 years 11 months ago
Line direction matters: an argument for the use of principal directions in 3D line drawings
While many factors contribute to shape perception, psychological research indicates that the direction of lines on the surface may have an important influence. This is especially ...
Ahna Girshick, Victoria Interrante, Steven Haker, ...
DILS
2006
Springer
13 years 10 months ago
Link Discovery in Graphs Derived from Biological Databases
Public biological databases contain vast amounts of rich data that can also be used to create and evaluate new biological hypothesis. We propose a method for link discovery in biol...
Petteri Sevon, Lauri Eronen, Petteri Hintsanen, Ki...
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 1 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...