Sciweavers

1018 search results - page 96 / 204
» Remote User Authentication Using Public Information
Sort
View
CHI
2010
ACM
14 years 2 months ago
The secure haptic keypad: a tactile password system
Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
Andrea Bianchi, Ian Oakley, Dong Soo Kwon
WWW
2010
ACM
13 years 8 months ago
Talking about data: sharing richly structured information through blogs and wikis
Abstract. Several projects have brought rich data semantics to collaborative wikis, but blogging platforms remain primarily limited to text. As blogs comprise a significant portion...
Edward Benson, Adam Marcus 0002, Fabian Howahl, Da...
ITRUST
2005
Springer
14 years 1 months ago
Experience-Based Trust: Enabling Effective Resource Selection in a Grid Environment
The Grid vision is to allow heterogeneous computational resources to be shared and utilised globally. Grid users are able to submit tasks to remote resources for execution. Howeve...
Nathan Griffiths, Kuo-Ming Chao
ISMIR
2004
Springer
104views Music» more  ISMIR 2004»
14 years 1 months ago
Organizing digital music for use: an examination of personal music collections
Current research on music information retrieval and music digital libraries focuses on providing access to huge, public music collections. In this paper we consider a different, b...
Steve Jones, Sally Jo Cunningham, Matt Jones
HUC
2010
Springer
13 years 9 months ago
CU-Later: a communication system considering time difference
Despite the widespread use of technology for social communication across distance, a number of barriers to such contact still exist. One such barrier is the problem of communicati...
Hitomi Tsujita, Svetlana Yarosh, Gregory D. Abowd