Sciweavers

1949 search results - page 122 / 390
» Protective Interface Specifications
Sort
View
KDD
2009
ACM
168views Data Mining» more  KDD 2009»
14 years 4 months ago
CAPTCHA-based image labeling on the Soylent Grid
We introduce an open labeling platform for Computer Vision researchers based on Captchas, creating as a byproduct labeled image data sets while supporting web security. For the tw...
Peter Faymonville, Kai Wang, John Miller, Serge J....
ICYCS
2008
IEEE
14 years 4 months ago
TNC-UTM: A Holistic Solution to Secure Enterprise Networks
This paper presents TNC-UTM, a holistic solution to secure enterprise networks from gateway to endpoints. Just as its name suggested, the TNC-UTM solution combines two popular tec...
Fachao Deng, An'an Luo, Yaokun Zhang, Zhen Chen, X...
IPPS
2008
IEEE
14 years 4 months ago
VT-ASOS: Holistic system software customization for many cores
VT-ASOS is a framework for holistic and continuous customization of system software on HPC systems. The framework leverages paravirtualization technology. VT-ASOS extends the Xen ...
Dimitrios S. Nikolopoulos, Godmar Back, Jyotirmaya...
ICMCS
2005
IEEE
92views Multimedia» more  ICMCS 2005»
14 years 3 months ago
Striping Delay-Sensitive Packets Over Multiple Bursty Wireless Channels
Multi-homed mobile devices have multiple wireless communication interfaces, each connecting to the Internet via a low speed and bursty WAN link such as a cellular link. We propose...
Gene Cheung, Puneet Sharma, Sung-Ju Lee
UIST
2004
ACM
14 years 3 months ago
A gesture-based authentication scheme for untrusted public terminals
Powerful mobile devices with minimal I/O capabilities increase the likelihood that we will want to annex these devices to I/O resources we encounter in the local environment. This...
Shwetak N. Patel, Jeffrey S. Pierce, Gregory D. Ab...