Sciweavers

274 search results - page 46 / 55
» Security user studies: methodologies and best practices
Sort
View
SIGECOM
2004
ACM
129views ECommerce» more  SIGECOM 2004»
14 years 25 days ago
Evaluating example-based search tools
A crucial element in consumer electronic commerce is a catalog tool that not only finds the product for the user, but also convinces him that he has made the best choice. To do th...
Pearl Huan Z. Pu, Pratyush Kumar
IGARSS
2009
13 years 5 months ago
Affine Compensation of Illumination in Hyperspectral Remote Sensing Images
A problem when working with optical satellite or airborne images is the need to compensate for changes in the illumination conditions at the time of acquisition. This is particula...
Pedro Latorre Carmona, Jose Moreno, Filiberto Pla,...
ASIACRYPT
2004
Springer
14 years 24 days ago
Constant-Round Authenticated Group Key Exchange for Dynamic Groups
Abstract. An authenticated group key exchange (AGKE) scheme allows a group of users in a public network to share a session key which may later be used to achieve desirable cryptogr...
Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee
CAD
2000
Springer
13 years 7 months ago
The Enterprise-Web portal for life-cycle support
As we enter the new millennium, the approach to product development is evolving rapidly. Companies are in the process of creating a distributed design and manufacturing environmen...
Mohsen Rezayat
CHI
2005
ACM
14 years 7 months ago
MultiView: spatially faithful group video conferencing
MultiView is a new video conferencing system that supports collaboration between remote groups of people. MultiView accomplishes this by being spatially faithful. As a result, Mul...
David T. Nguyen, John F. Canny