Sciweavers

1092 search results - page 190 / 219
» Supporting human memory in personal information management
Sort
View
VIZSEC
2005
Springer
14 years 2 months ago
Visual Correlation of Host Processes and Network Traffic
Anomalous communication patterns are one of the leading indicators of computer system intrusions according to the system administrators we have interviewed. But a major problem is...
Glenn A. Fink, Paul Muessig, Chris North
ATAL
2010
Springer
13 years 9 months ago
Virtual world builder toolkit
In this paper we present a system that automatically generates a 3D virtual world from a virtual institution (VI) specification, namely of activities that will take place in the v...
T. Trescak, M. Esteva, I. Rodriguez, J. Morales
WICON
2008
13 years 10 months ago
SAMPL: a simple aggregation and message passing layer for sensor networks
In recent years, wireless sensor networking has shown great promise in applications ranging from industrial control, environmental monitoring and inventory tracking. Given the res...
Anthony Rowe, Karthik Lakshmanan, Ragunathan Rajku...
WISEC
2010
ACM
13 years 8 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
SOUPS
2010
ACM
14 years 11 days ago
On the impact of real-time feedback on users' behaviour in mobile location-sharing applications
Effective privacy management requires that mobile systems‟ users be able to make informed privacy decisions as their experience and knowledge of a system progresses. Prior work ...
Lukasz Jedrzejczyk, Blaine A. Price, Arosha K. Ban...