Sciweavers

1018 search results - page 197 / 204
» Remote User Authentication Using Public Information
Sort
View
CHI
2009
ACM
14 years 8 months ago
Coralog: use-aware visualization connecting human micro-activities to environmental change
This paper describes the goal, design approach and specification, and preliminary use test of a use-aware ambient media called Coralog. Coralog is a widget which detects the durat...
Tanyoung Kim, Hwajung Hong, Brian Magerko
CIAC
2003
Springer
98views Algorithms» more  CIAC 2003»
14 years 1 months ago
Improving Customer Proximity to Railway Stations
Abstract. We consider problems of (new) station placement along (existing) railway tracks, so as to increase the number of users. We prove that, in spite of the NP-hardness for the...
Evangelos Kranakis, Paolo Penna, Konrad Schlude, D...
CCS
2010
ACM
13 years 8 months ago
Dissecting one click frauds
"One Click Fraud" is an online confidence scam that has been plaguing an increasing number of Japanese Internet users, in spite of new laws and the mobilization of polic...
Nicolas Christin, Sally S. Yanagihara, Keisuke Kam...
ELPUB
2006
ACM
14 years 1 months ago
The Text Encoding Initiative Anno 2005: An Orientation and Workshop
The Text Encoding Initiative is an international and interdisciplinary standards project established in 1987 to develop, maintain and promulgate hardware- and software-independent...
Lou Burnard, Matthew Driscoll
ACMACE
2008
ACM
13 years 9 months ago
When RFIDs meet artist's painting
This work challenges the conventional art experience. It brings together the fields of art, science, and software integration. The goal was to create a new kind of painting based ...
Olivier Haberman, Romain Pellerin, Ugo Haberman