Sciweavers

851 search results - page 92 / 171
» Virtual institutions prototype
Sort
View
137
Voted
KDD
1999
ACM
128views Data Mining» more  KDD 1999»
15 years 6 months ago
Towards Automated Synthesis of Data Mining Programs
Code synthesis is routinely used in industry to generate GUIs, form lling applications, and database support code and is even used with COBOL. In this paper we consider the questi...
Wray L. Buntine, Bernd Fischer 0002, Thomas Pressb...
130
Voted
CHI
2008
ACM
16 years 3 months ago
Usability evaluation considered harmful (some of the time)
Current practice in Human Computer Interaction as encouraged by educational institutes, academic review processes, and institutions with usability groups advocate usability evalua...
Saul Greenberg, William Buxton
118
Voted
SACMAT
2009
ACM
15 years 9 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
135
Voted
FC
2006
Springer
129views Cryptology» more  FC 2006»
15 years 6 months ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig
HAPTICS
2006
IEEE
15 years 8 months ago
Two-dimensional Scanning Tactile Display using Ultrasound Radiation Pressure
In this paper, we propose a new tactile display which produces spatio-temporal stress patterns on a 2-D plane. The first prototype of the display consists of an octagonal arrange...
Takayuki Iwamoto, Hiroyuki Shinoda