Sciweavers

1575 search results - page 248 / 315
» The provenance of electronic data
Sort
View
HICSS
2009
IEEE
228views Biometrics» more  HICSS 2009»
14 years 4 months ago
Agents of Diffusion - Insights from a Survey of Facebook Users
In times of web 2.0 and its strong focus on user interaction in business models, entrepreneurs and investors of internet businesses often back up their ambitious growth expectatio...
Rebecca Ermecke, Philip Mayrhofer, Stefan Wagner
PERCOM
2009
ACM
14 years 4 months ago
uWave: Accelerometer-based Personalized Gesture Recognition and Its Applications
Abstract—The proliferation of accelerometers on consumer electronics has brought an opportunity for interaction based on gestures or physical manipulation of the devices. We pres...
Jiayang Liu, Zhen Wang, Lin Zhong, Jehan Wickramas...
CSE
2009
IEEE
14 years 4 months ago
Bio-chaotic Stream Cipher-Based Iris Image Encryption
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brut...
Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mah...
SOUPS
2009
ACM
14 years 4 months ago
Personal choice and challenge questions: a security and usability assessment
Challenge questions are an increasingly important part of mainstream authentication solutions, yet there are few published studies concerning their usability or security. This pap...
Mike Just, David Aspinall
ETFA
2008
IEEE
14 years 4 months ago
e-based inter-enterprise supply chain Kanban for demand and order fulfilment management
– The philosophy of Kanban is that parts and materials should be supplied at the very moment they are needed in the factory manufacturing process. e-based inter-enterprise supply...
Linton L. S. Chai