Sciweavers

557 search results - page 53 / 112
» Two experiences designing for effective security
Sort
View
CCS
2009
ACM
14 years 3 months ago
Scalable onion routing with torsk
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of th...
Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongd...
SOUPS
2009
ACM
14 years 3 months ago
A "nutrition label" for privacy
We used an iterative design process to develop a privacy label that presents to consumers the ways organizations collect, use, and share personal information. Many surveys have sh...
Patrick Gage Kelley, Joanna Bresee, Lorrie Faith C...
CODES
2006
IEEE
14 years 2 months ago
Thermal-aware high-level synthesis based on network flow method
Lowering down the chip temperature is becoming one of the important design considerations, since temperature adversely and seriously affects many of design qualities, such as reli...
Pilok Lim, Taewhan Kim
FUNGAMES
2010
13 years 9 months ago
Recognizing self in puppet controlled virtual avatars
Recent work in neuroscience suggests that there is a common coding in the brain between perception, imagination and execution of movement. Further, this common coding is considere...
Ali Mazalek, Michael Nitsche, Sanjay Chandrasekhar...
IPM
2002
106views more  IPM 2002»
13 years 8 months ago
A feature mining based approach for the classification of text documents into disjoint classes
This paper proposes a new approach for classifying text documents into two disjoint classes. The new approach is based on extracting patterns, in the form of two logical expressio...
Salvador Nieto Sánchez, Evangelos Triantaph...