Sciweavers

1022 search results - page 145 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
CHINZ
2005
ACM
13 years 11 months ago
Exploring sketch beautification techniques
Beautification of vague, imprecise sketchy ink input is an interesting area for exploration, especially with the emergence of pen-based systems, such as the Tablet PC. Fifty perce...
Beirong Wang, Jian Sun, Beryl Plimmer
SIGCOMM
2004
ACM
14 years 2 months ago
Locating internet routing instabilities
This paper presents a methodology for identifying the autonomous system (or systems) responsible when a routing change is observed and propagated by BGP. The origin of such a rout...
Anja Feldmann, Olaf Maennel, Zhuoqing Morley Mao, ...
SIGCSE
2010
ACM
183views Education» more  SIGCSE 2010»
14 years 3 months ago
Electronic commerce virtual laboratory
Website security is essential for successful e-commerce ventures, but the vital “how-to” components of security are often lacking in academic courses. This paper describes our...
Joel Coffman, Alfred C. Weaver
ICARCV
2008
IEEE
140views Robotics» more  ICARCV 2008»
14 years 3 months ago
Gaining colour stability in live image capturing
Digital colour cameras are dramatically falling in price, making them affordable for ubiquitous appliances in many applications. An attempt to use colour information reveals a si...
Guy K. Kloss, Napoleon H. Reyes, Martin J. Johnson...
CHI
1996
ACM
14 years 1 months ago
The Freedom to Work from an Arbitiary Position
We have designed two sets of communication tools to enable telepresence in groups who work in different locations. Afterwards we evaluated the tools. Studie (A), in the first grou...
Britt Jönsson, Anna Schömer, Konrad Toll...