Sciweavers

1592 search results - page 57 / 319
» The state of the email address
Sort
View
HICSS
2007
IEEE
80views Biometrics» more  HICSS 2007»
14 years 3 months ago
The Development of a University-Based Forensics Training Center as a Regional Outreach and Service Activity
This paper describes a university-based Forensics Training Center (FTC) established by a Department of Justice grant for the purpose of improving the ability of state and local la...
Rayford B. Vaughn, David A. Dampier
CORR
2002
Springer
98views Education» more  CORR 2002»
13 years 9 months ago
Two Representations for Iterative Non-prioritized Change
We address a general representation problem for belief change, and describe two interrelated representations for iterative nonprioritized change: a logical representation in terms...
Alexander Bochman
CHI
2004
ACM
14 years 9 months ago
Using mental load for managing interruptions in physiologically attentive user interfaces
Today's user is surrounded by mobile appliances that continuously disrupt his activities through instant message, email and phone call notifications. In this paper, we presen...
Daniel Chen, Roel Vertegaal
IMC
2009
ACM
14 years 3 months ago
Energy consumption in mobile phones: a measurement study and implications for network applications
In this paper, we present a measurement study of the energy consumption characteristics of three widespread mobile networking technologies: 3G, GSM, and WiFi. We find that 3G and...
Niranjan Balasubramanian, Aruna Balasubramanian, A...
ACSAC
2008
IEEE
14 years 3 months ago
PinUP: Pinning User Files to Known Applications
Users commonly download, patch, and use applications such as email clients, office applications, and media-players from the Internet. Such applications are run with the user’s ...
William Enck, Patrick Drew McDaniel, Trent Jaeger