Sciweavers

377 search results - page 65 / 76
» Studying activity patterns in CSCW
Sort
View
IDEAL
2010
Springer
13 years 6 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
TITS
2010
110views Education» more  TITS 2010»
13 years 3 months ago
Research Collaboration and ITS Topic Evolution: 10 Years at T-ITS
This paper investigates the collaboration patterns and research topic trends in the publications of the IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (T-ITS) over the pas...
Linjing Li, Xin Li, Changjian Cheng, Cheng Chen, G...
IWANN
2011
Springer
12 years 11 months ago
Isometric Coding of Spiking Haptic Signals by Peripheral Somatosensory Neurons
Abstract. We study how primary tactile afferents encode relevant contact features to mediate early processing of haptic information. In this paper, we apply metrical information t...
Romain Brasselet, Roland S. Johansson, Angelo Arle...
WWW
2004
ACM
14 years 9 months ago
Anti-aliasing on the web
It is increasingly common for users to interact with the web using a number of different aliases. This trend is a doubleedged sword. On one hand, it is a fundamental building bloc...
Jasmine Novak, Prabhakar Raghavan, Andrew Tomkins
VIZSEC
2005
Springer
14 years 2 months ago
IDS RainStorm: Visualizing IDS Alarms
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...