Sciweavers

13224 search results - page 2455 / 2645
» Self-monitoring for Computer Users
Sort
View
IJNSEC
2007
126views more  IJNSEC 2007»
13 years 8 months ago
Elliptic Curve Cryptography Based Wireless Authentication Protocol
Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower comp...
Yongliang Liu, Wen Gao, Hongxun Yao, Xinghua Yu
SP
2008
IEEE
115views Security Privacy» more  SP 2008»
13 years 8 months ago
Compromising Reflections-or-How to Read LCD Monitors around the Corner
We present a novel eavesdropping technique for spying at a distance on data that is displayed on an arbitrary computer screen, including the currently prevalent LCD monitors. Our ...
Michael Backes, Markus Dürmuth, Dominique Unr...
BIB
2005
149views more  BIB 2005»
13 years 8 months ago
Biomolecular Interaction Network Database
The Biomolecular Interaction Network Database (BIND) (http://bind.ca) archives biomolecular interaction, reaction, complex and pathway information. Our aim is to curate the detail...
Don Gilbert
IWC
2007
104views more  IWC 2007»
13 years 8 months ago
Lightweight techniques for structural evaluation of animated metaphors
Visual metaphors in the form of still or animated pictures have been used in user interfaces with the hope of enhancing learning and use of computer applications. This paper studi...
Jorma Sajaniemi, Tuija Stützle
TKDE
2008
126views more  TKDE 2008»
13 years 8 months ago
The Discrete Basis Problem
Matrix decomposition methods represent a data matrix as a product of two smaller matrices: one containing basis vectors that represent meaningful concepts in the data, and another ...
Pauli Miettinen, Taneli Mielikäinen, Aristide...
« Prev « First page 2455 / 2645 Last » Next »