Sciweavers

1795 search results - page 102 / 359
» Security Models and Information Flow
Sort
View
125
Voted
CHI
2008
ACM
16 years 4 months ago
An exploratory study of visual information analysis
To design information visualization tools for collaborative use, we need to understand how teams engage with visualizations during their information analysis process. We report on...
Petra Isenberg, Anthony Tang, M. Sheelagh T. Carpe...
115
Voted
CIIT
2004
127views Communications» more  CIIT 2004»
15 years 5 months ago
OLSIM: Up-to-date traffic information on the web
The Internet is a convenient platform to distribute real time traffic information. Thus, we propose a web-based visualization of the current and future traffic load of the entire ...
Andreas Pottmeier, Roland Chrobok, Sigurdur F. Haf...
145
Voted
INTELLCOMM
2004
Springer
15 years 9 months ago
Inferring Presence in a Context-Aware Instant Messaging System
Abstract. The increasing volume of digital communication is raising new challenges in the management of the information flow. We discuss the usage of context to infer presence info...
Mikko Perttunen, Jukka Riekki
112
Voted
FC
2007
Springer
122views Cryptology» more  FC 2007»
15 years 9 months ago
Mental Models of Security Risks
1 2 There is a critical need in computer security to communicate risks and thereby enable informed decisions by naive users. Yet computer security has not been engaged with the sc...
Farzaneh Asgharpour, Debin Liu, L. Jean Camp
109
Voted
CORR
2008
Springer
107views Education» more  CORR 2008»
15 years 3 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg