Sciweavers

557 search results - page 43 / 112
» Two experiences designing for effective security
Sort
View
AAAI
1996
13 years 10 months ago
Source Selection for Analogical Reasoning: An Empirical Approach
of it suffer from a number of limitations, including: The effectiveness of an analogical reasoner depends upon its ability to select a relevant analogical source. In many problem d...
William A. Stubblefield, George F. Luger
TOCHI
2002
63views more  TOCHI 2002»
13 years 8 months ago
Rivalry and interference with a head-mounted display
Perceptual factors that effect monocular, transparent (a.k.a "see-thru") head mounted displays include binocular rivalry, visual interference, and depth of focus. We rep...
Robert S. Laramee, Colin Ware
MM
2005
ACM
126views Multimedia» more  MM 2005»
14 years 2 months ago
A corpus-based singing voice synthesis system for mandarin Chinese
In this paper, the design and implementation of a corpus-based singing voice synthesis (SVS) system for Mandarin Chinese was introduced. The design rules of three corpora for sing...
Cheng-Yuan Lin, Tzu-Ying Lin, Jyh-Shing Roger Jang
SIGCOMM
2012
ACM
11 years 11 months ago
Abstractions for network update
ions for Network Update Mark Reitblatt Cornell Nate Foster Cornell Jennifer Rexford Princeton Cole Schlesinger Princeton David Walker Princeton Configuration changes are a common...
Mark Reitblatt, Nate Foster, Jennifer Rexford, Col...
ACSAC
2006
IEEE
14 years 13 days ago
Data Sandboxing: A Technique for Enforcing Confidentiality Policies
When an application reads private / sensitive information and subsequently communicates on an output channel such as a public file or a network connection, how can we ensure that ...
Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakri...