Sciweavers

4201 search results - page 136 / 841
» Our Users have Root!
Sort
View
UIST
1995
ACM
13 years 12 months ago
Migratory Applications
We introduce a new genre of user interface applications that can migrate from one machine to another, taking their user interface and application contexts with them, and continue ...
Krishna Bharat, Luca Cardelli
ACNS
2005
Springer
116views Cryptology» more  ACNS 2005»
14 years 1 months ago
Two-Server Password-Only Authenticated Key Exchange
Typical protocols for password-based authentication assume a single server which stores all the information (e.g., the password) necessary to authenticate a user. Unfortunately, a...
Jonathan Katz, Philip D. MacKenzie, Gelareh Taban,...
AMR
2005
Springer
100views Multimedia» more  AMR 2005»
14 years 1 months ago
Using Segmented Objects in Ostensive Video Shot Retrieval
This paper presents a system for video shot retrieval in which shots are retrieved based on matching video objects using a combination of colour, shape and texture. Rather than mat...
Sorin Sav, Hyowon Lee, Alan F. Smeaton, Noel E. O'...
AVI
2006
13 years 9 months ago
Exploring visual feedback of change conflict in a distributed 3D environment
Teams that are geographically distributed often share information both in real-time and asynchronously. When such sharing is through groupware, change conflicts can arise when peo...
Mark S. Hancock, John David Miller, Saul Greenberg...
ISVC
2010
Springer
13 years 6 months ago
Visual Exploration of Stream Pattern Changes Using a Data-Driven Framework
Abstract. When using visualization techniques to explore data streams, an important task is to convey pattern changes. Challenges include: (1) Most data analysis tasks require user...
Zaixian Xie, Matthew O. Ward, Elke A. Rundensteine...