Sciweavers

1618 search results - page 199 / 324
» Privacy Interfaces for Information Management
Sort
View
144
Voted
BCSHCI
2008
15 years 5 months ago
Understanding behaviors and needs for home videos
Nowadays, people capture, edit and share more and more home videos. Devices with video capturing capability and services for video sharing and editing are becoming increasingly po...
Marco Campanella, Jettie Hoonhout
USENIX
2000
15 years 5 months ago
Scalable Network I/O in Linux
Recent highly publicized benchmarks have suggested that Linux systems do not scale as well as other systems, such as Windows NT, when used as network servers. Windows NT contains ...
Niels Provos, Chuck Lever
JTAER
2008
103views more  JTAER 2008»
15 years 3 months ago
Reducing False Reads in RFID-Embedded Supply Chains
RFID tags are increasingly being used in supply chain applications due to their potential in engendering supply chain visibility and reducing tracking errors through instantaneous...
Yu-Ju Tu, Selwyn Piramuthu
IJMI
2007
134views more  IJMI 2007»
15 years 3 months ago
Investigating risk exposure in e-health systems
: The increasing dependency being placed on electronic health information systems presents new challenges for today’s health managers and systems developers. This paper uses Elec...
Peter R. Croll, Jasmine Croll
CHI
2008
ACM
16 years 4 months ago
Talc: using desktop graffiti to fight software vulnerability
With the proliferation of computer security threats on the Internet, especially threats such as worms that automatically exploit software flaws, it is becoming more and more impor...
Kandha Sankarpandian, Travis Little, W. Keith Edwa...