Sciweavers

663 search results - page 10 / 133
» PKI design for the real world
Sort
View
WETICE
2000
IEEE
13 years 12 months ago
CVE Technology Development Based on Real World Application and User Needs
This paper argues that the development of Collaborative Virtual Environment (CVE) technology must be guided by application and end user needs. A collaboration is described between ...
Daphne Economou, William L. Mitchell, Steve Pettif...
IV
2009
IEEE
185views Visualization» more  IV 2009»
14 years 2 months ago
Real-World User Evaluations of a Visual and Interactive Web Search Interface
Although laboratory user studies are the most common method for validating the utility of information visualization systems, it may be difficult to determine if such studies accu...
Orland Hoeber, Daniel Schroeder, Michael Brooks
IEAAIE
2005
Springer
14 years 29 days ago
Movement Prediction from Real-World Images Using a Liquid State Machine
Prediction is an important task in robot motor control where it is used to gain feedback for a controller. With such a self-generated feedback, which is available before sensor rea...
Harald Burgsteiner, Mark Kröll, Alexander Leo...
CCGRID
2008
IEEE
14 years 1 months ago
Peer-to-Peer Desktop Grids in the Real World: The ShareGrid Project
ShareGrid is a peer-to-peer desktop grid aimed at satisfying the computing needs of the small research laboratories located in the Piedmont area in Northern Italy. ShareGrid adopt...
Cosimo Anglano, Massimo Canonico, Marco Guazzone, ...
SOUPS
2010
ACM
13 years 11 months ago
Towards understanding ATM security: a field study of real world ATM use
With the increase of automated teller machine (ATM) frauds, new authentication mechanisms are developed to overcome security problems of personal identification numbers (PIN). Th...
Alexander De Luca, Marc Langheinrich, Heinrich Hus...