Sciweavers

5344 search results - page 965 / 1069
» Privacy-Preserving Set Operations
Sort
View
102
Voted
SOUPS
2009
ACM
15 years 9 months ago
Look into my eyes!: can you guess my password?
Authentication systems for public terminals – and thus public spaces – have to be fast, easy and secure. Security is of utmost importance since the public setting allows manif...
Alexander De Luca, Martin Denzel, Heinrich Hussman...
SOUPS
2009
ACM
15 years 9 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
109
Voted
SOUPS
2009
ACM
15 years 9 months ago
Revealing hidden context: improving mental models of personal firewall users
The Windows Vista personal firewall provides its diverse users with a basic interface that hides many operational details. However, concealing the impact of network context on th...
Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov
103
Voted
EDBT
2010
ACM
155views Database» more  EDBT 2010»
15 years 9 months ago
Reducing metadata complexity for faster table summarization
Since the visualization real estate puts stringent constraints on how much data can be presented to the users at once, table summarization is an essential tool in helping users qu...
K. Selçuk Candan, Mario Cataldi, Maria Luis...
131
Voted
BMEI
2008
IEEE
15 years 9 months ago
Development of Epicardial Mapping System for Studying Atrial Fibrillation
Epicardial mapping system is an important tool for studying electrophysiological characteristics of atrial fibrillation (AF). AF is the most common arrhythmia and is becoming more...
Cuiwei Yang, Weijia Lu, Tuo Zhou, Xiaomei Wu, Zuxi...