Sciweavers

851 search results - page 92 / 171
» Virtual institutions prototype
Sort
View
KDD
1999
ACM
128views Data Mining» more  KDD 1999»
14 years 1 months ago
Towards Automated Synthesis of Data Mining Programs
Code synthesis is routinely used in industry to generate GUIs, form lling applications, and database support code and is even used with COBOL. In this paper we consider the questi...
Wray L. Buntine, Bernd Fischer 0002, Thomas Pressb...
CHI
2008
ACM
14 years 9 months ago
Usability evaluation considered harmful (some of the time)
Current practice in Human Computer Interaction as encouraged by educational institutes, academic review processes, and institutions with usability groups advocate usability evalua...
Saul Greenberg, William Buxton
SACMAT
2009
ACM
14 years 3 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
FC
2006
Springer
129views Cryptology» more  FC 2006»
14 years 14 days ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig
HAPTICS
2006
IEEE
14 years 2 months ago
Two-dimensional Scanning Tactile Display using Ultrasound Radiation Pressure
In this paper, we propose a new tactile display which produces spatio-temporal stress patterns on a 2-D plane. The first prototype of the display consists of an octagonal arrange...
Takayuki Iwamoto, Hiroyuki Shinoda