Sciweavers

274 search results - page 48 / 55
» Security user studies: methodologies and best practices
Sort
View
SP
2010
IEEE
192views Security Privacy» more  SP 2010»
13 years 11 months ago
How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation
—Captchas are designed to be easy for humans but hard for machines. However, most recent research has focused only on making them hard for machines. In this paper, we present wha...
Elie Bursztein, Steven Bethard, Celine Fabry, John...
ICC
2008
IEEE
115views Communications» more  ICC 2008»
14 years 1 months ago
Oblivious Routing for Wireless Mesh Networks
—Wireless mesh networks have attracted increasing attention and deployment as a high-performance and low-cost solution to last-mile broadband Internet access. Traffic routing pl...
Jonathan Wellons, Yuan Xue
MOBISYS
2009
ACM
14 years 8 months ago
Wifi-reports: improving wireless network selection with collaboration
Wi-Fi clients can obtain much better performance at some commercial hotspots than at others. Unfortunately, there is currently no way for users to determine which hotspot access p...
Jeffrey Pang, Ben Greenstein, Michael Kaminsky, Da...
VISUALIZATION
2005
IEEE
14 years 29 days ago
Fast and Reproducible Fiber Bundle Selection in DTI Visualization
Diffusion Tensor Imaging (DTI) is an MRI-based technique for quantifying water diffusion in living tissue. In the white matter of the brain, water diffuses more rapidly along the ...
Jorik Blaas, Charl P. Botha, Bart Peters, Frans Vo...
BMCBI
2011
13 years 2 months ago
iPhy: an integrated phylogenetic workbench for supermatrix analyses
Background: The increasing availability of molecular sequence data means that the accuracy of future phylogenetic studies is likely to by limited by systematic bias and taxon choi...
Martin O. Jones, Georgios D. Koutsovoulos, Mark L....