Sciweavers

2214 search results - page 239 / 443
» Initial Design of the
Sort
View
IEEEARES
2007
IEEE
14 years 4 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
BPM
2007
Springer
201views Business» more  BPM 2007»
14 years 3 months ago
Towards Formal Analysis of Artifact-Centric Business Process Models
Abstract. Business process (BP) modeling is a building block for design and management of business processes. Two fundamental aspects of BP modeling are: a formal framework that we...
Kamal Bhattacharya, Cagdas Evren Gerede, Richard H...
MIDDLEWARE
2007
Springer
14 years 3 months ago
Wireless ad hoc VoIP
VoIP is one of the traditional application scenarios for Mobile Ad Hoc Networks (MANETs) in settings such as emergency response. Ideally, VoIP would be transparent to the network ...
Patrick Stuedi, Gustavo Alonso
PERVASIVE
2007
Springer
14 years 3 months ago
Evaluating a Wearable Display Jersey for Augmenting Team Sports Awareness
This paper introduces a user-centered design process and case study evaluation of a novel wearable visualization system for team sports, coined TeamAwear. TeamAwear consists of thr...
Mitchell Page, Andrew Vande Moere
3DPVT
2006
IEEE
192views Visualization» more  3DPVT 2006»
14 years 3 months ago
Spherical Catadioptric Arrays: Construction, Multi-View Geometry, and Calibration
This paper introduces a novel imaging system composed of an array of spherical mirrors and a single highresolution digital camera. We describe the mechanical design and constructi...
Douglas Lanman, Daniel E. Crispell, Megan Wachs, G...