Sciweavers

226 search results - page 30 / 46
» Special Issue on Information Explosion
Sort
View
CCS
2007
ACM
14 years 28 days ago
Beamauth: two-factor web authentication with a bookmark
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
Ben Adida
IH
2007
Springer
14 years 27 days ago
Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation
The recent decade has seen the emergence of 3D meshes in industrial, medical and entertainment applications. Therefore, their intellectual property protection problem has attracted...
Kai Wang, Guillaume Lavoué, Florence Denis,...
LCN
2006
IEEE
14 years 23 days ago
Wireless Sensor Networks: The Quest for Planetary Field Sensing
— The paper presents a thought experiment as to the feasibility of using large scale wireless sensor networks as a vehicle for high level scientific investigation. The discussion...
Elena I. Gaura, Robert M. Newman
LCN
2006
IEEE
14 years 23 days ago
Flexible Flow Aggregation for Adaptive Network Monitoring
Network monitoring is a major building block for many domains in communication networks. Besides typical accounting mechanisms and the emerging area of charging in next generation...
Falko Dressler, Gerhard Münz
SIGCSE
2006
ACM
201views Education» more  SIGCSE 2006»
14 years 21 days ago
Everything I needed to know about teaching I learned in kindergarten: bringing elementary education techniques to undergraduate
By expanding the teaching styles used in computer science classrooms, we can expand the audience of students that enjoy and excel in technology. Rather than focusing on major curr...
Shannon Pollard, Robert C. Duvall