Sciweavers

2702 search results - page 294 / 541
» Message from the Editor
Sort
View
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
16 years 4 months ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
CHI
2006
ACM
16 years 4 months ago
Tactile crescendos and sforzandos: applying musical techniques to tactile icon design
Tactile icons (Tactons) are structured vibrotactile messages which can be used for non visual information display. Information is encoded in Tactons by manipulating vibrotactile p...
Lorna M. Brown, Stephen A. Brewster, Helen C. Purc...
CHI
2005
ACM
16 years 4 months ago
Communicating intimacy one bit at a time
In this paper, we present a study of `minimal intimate objects': low bandwidth devices for communicating intimacy for couples in long-distance relationships. We describe a us...
Joseph Kaye, Mariah K. Levitt, Jeffrey Nevins, Jes...
CHI
2004
ACM
16 years 4 months ago
Connecting with the absent presence: pervasive technology use and effects on community
This research investigates how the pervasive use of technology by an individual in the physical presence of group members affects community level. When technology use occurs, the ...
Lisa Kleinman
SIGMOD
2006
ACM
170views Database» more  SIGMOD 2006»
16 years 4 months ago
Energy-efficient monitoring of extreme values in sensor networks
Monitoring extreme values (MAX or MIN) is a fundamental problem in wireless sensor networks (and in general, complex dynamic systems). This problem presents very different algorit...
Adam Silberstein, Jun Yang 0001, Kamesh Munagala