Sciweavers

1519 search results - page 58 / 304
» What do they think
Sort
View
ECSA
2010
Springer
13 years 10 months ago
Formal approach to security metrics.: what does "more secure" mean for you?
Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
Leanid Krautsevich, Fabio Martinelli, Artsiom Yaut...
JMM2
2008
81views more  JMM2 2008»
13 years 10 months ago
What Conditions are Required to Effectively Use Augmented Reality for Manuals in Actual Work
Augmented Reality (AR) is expected to be applied to manuals for assembling or inspecting tasks instead of traditional paper-based ones. Our previous study revealed that when an AR ...
Miwa Nakanishi, Mugihiko Ozeki, Toshiya Akasaka, Y...
MICRO
2012
IEEE
231views Hardware» more  MICRO 2012»
12 years 15 days ago
What is Happening to Power, Performance, and Software?
The past 10 years have delivered two significant revolutions. (1) Microprocessor design has been transformed by the limits of chip power, wire latency, and Dennard scaling—leadi...
Hadi Esmaeilzadeh, Ting Cao, Xi Yang, Stephen Blac...
WWW
2009
ACM
14 years 10 months ago
What's up CAPTCHA?: a CAPTCHA based on image orientation
We present a new CAPTCHA which is based on identifying an image's upright orientation. This task requires analysis of the often complex contents of an image, a task which hum...
Rich Gossweiler, Maryam Kamvar, Shumeet Baluja
CHI
2005
ACM
14 years 10 months ago
What is connected by mutual gaze?: user's behavior in video-mediated communication
Video-mediated communication systems such as teleconferencing and videophone have become popular. As with face-to-face communication, non-verbal cues such as gaze, facial expressi...
Naoki Mukawa, Tsugumi Oka, Kumiko Arai, Masahide Y...