Sciweavers

340 search results - page 38 / 68
» With Gaming Technology towards Secure User Interfaces
Sort
View
148
Voted
JSAC
2008
199views more  JSAC 2008»
15 years 3 months ago
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
Cognitive Radio (CR) is a promising technology that can alleviate the spectrum shortage problem by enabling unlicensed users equipped with CRs to coexist with incumbent users in li...
Ruiliang Chen, Jung Min Park, Jeffrey H. Reed
136
Voted
ACMACE
2009
ACM
15 years 10 months ago
iSee: interactive scenario explorer for online tournament games
Fantasy games, in which players compete to correctly predict realworld outcomes in sports, entertainment, and politics, have grown in popularity and now represent a significant po...
Greg Smith, Desney S. Tan, Bongshin Lee
158
Voted
CIKM
2008
Springer
15 years 5 months ago
Towards privacy-preserving integration of distributed heterogeneous data
More and more applications rely heavily on large amounts of data in the distributed storages collected over time or produced by large scale scientific experiments or simulations. ...
Pawel Jurczyk, Li Xiong
111
Voted
CHI
2010
ACM
15 years 8 months ago
O job can you return my mojo: improving human engagement and enjoyment in routine activities
Unlike machines, we humans are prone to boredom when we perform routine activities for long periods of time. Workers’ mental engagement in boring tasks diminishes, which eventua...
Dvijesh Shastri, Yuichi Fujiki, Ross Buffington, P...
CSCWD
2008
Springer
15 years 5 months ago
XML and web services security
With an increasing amount of semi-structured data XML has become important. XML documents may contain private information that cannot be shared by all user communities. Therefore,...
Lili Sun, Yan Li