-
2
-
-
34548344520
-
-
June
-
Anti-Phishing Working Group (APWG). Phishing activity trends report, June 2005. http://antiphishing.org/.
-
(2005)
Phishing Activity Trends Report
-
-
-
4
-
-
33646556396
-
Using symbiotic displays to view sensitive information in public
-
IEEE
-
S. Berger, R. Kjeldsen, C. Narayanaswami, C. Pinhanez, M. Podlaseck, and M. Raghunath. Using symbiotic displays to view sensitive information in public. In Proceedings of PERCOM. IEEE, 2005.
-
(2005)
Proceedings of PERCOM
-
-
Berger, S.1
Kjeldsen, R.2
Narayanaswami, C.3
Pinhanez, C.4
Podlaseck, M.5
Raghunath, M.6
-
6
-
-
0034447799
-
WebSplitter: A unified XML framework for multi-device collaborative web browsing
-
ACM
-
Richard Han, Veronique Perret, and Mahmoud Naghshineh. WebSplitter: a unified XML framework for multi-device collaborative web browsing. In Proceedings of CSCW 2000. ACM, 2000.
-
(2000)
Proceedings of CSCW 2000
-
-
Han, R.1
Perret, V.2
Naghshineh, M.3
-
7
-
-
1842712330
-
Text information extraction in images and video: A survey
-
Keechul Jung, Kwang In Kim, and Anil K. Jain. Text information extraction in images and video: a survey. Pattern Recognition, 37:977-997, 2004.
-
(2004)
Pattern Recognition
, vol.37
, pp. 977-997
-
-
Jung, K.1
Kwang In Kim2
Jain, A.K.3
-
11
-
-
0041386047
-
Using handhelds and PCs together
-
Brad A. Myers. Using handhelds and PCs together. Communications of the ACM, 44(11):34-41, 2001.
-
(2001)
Communications of the ACM
, vol.44
, Issue.11
, pp. 34-41
-
-
Myers, B.A.1
-
12
-
-
0007982230
-
What would you do with 100 MIPS on your wrist?
-
IBM Research, January
-
Chandra Narayanaswami, M. T. Raghunath, Noboru Kamijoh, and Tadonobu Inoue. What would you do with 100 MIPS on your wrist? Technical Report RC 22057 (98634), IBM Research, January 2001.
-
(2001)
Technical Report
, vol.RC 22057 98634
-
-
Narayanaswami, C.1
Raghunath, M.T.2
Kamijoh, N.3
Inoue, T.4
-
13
-
-
4243090904
-
-
Kluwer Academic Publishers, Norwell, MA, USA
-
Kenton O'Hara, Mark Perry, and Elizabeth Churchill. Public and Situated Displays: Social and Interactional Aspects of Shared Display Technologies. Kluwer Academic Publishers, Norwell, MA, USA, 2004.
-
(2004)
Public and Situated Displays: Social and Interactional Aspects of Shared Display Technologies
-
-
O'Hara, K.1
Perry, M.2
Churchill, E.3
-
14
-
-
21644455714
-
Securing a remote terminal application with a mobile trusted device
-
Alina Oprea, Dirk Balfanz, Glenn Durfee, and Diana Smetters. Securing a remote terminal application with a mobile trusted device. In Proceedings of ACSA 2004. Available from http://www.acsa-admin.org/.
-
Proceedings of ACSA 2004
-
-
Oprea, A.1
Balfanz, D.2
Durfee, G.3
Smetters, D.4
-
16
-
-
19544393220
-
Opportunistic annexing for handheld devices: Opportunities and challenges
-
Jeffrey S. Pierce and Heather Mahaney. Opportunistic annexing for handheld devices: Opportunities and challenges. In Proceedings of HCIC 2004, 2004.
-
(2004)
Proceedings of HCIC 2004
-
-
Pierce, J.S.1
Mahaney, H.2
-
17
-
-
0141494334
-
Fostering a symbiotic handheld environment
-
Mandayam Raghunath, Chandra Narayanaswami, and Claudio Pinhanez. Fostering a symbiotic handheld environment. Computer, 36(9):56-65, 2003.
-
(2003)
Computer
, vol.36
, Issue.9
, pp. 56-65
-
-
Raghunath, M.1
Narayanaswami, C.2
Pinhanez, C.3
-
18
-
-
0007968045
-
Virtual network computing
-
Tristan Richardson, Quentin Stafford-Fraser, Kenneth R. Wood, and Andy Hopper. Virtual network computing. IEEE Internet Computing, 2(1):33-38, 1998.
-
(1998)
IEEE Internet Computing
, vol.2
, Issue.1
, pp. 33-38
-
-
Richardson, T.1
Stafford-Fraser, Q.2
Wood, K.R.3
Hopper, A.4
-
19
-
-
0036785515
-
A composable framework for secure multi-modal access to Internet services from post-PC devices
-
Steven J. Ross, Jason L. Hill, Michael Y. Chen, Anthony D. Joseph, David E. Culler, and Eric A. Brewer. A composable framework for secure multi-modal access to Internet services from post-PC devices. Mob. Netw. Appl., 7(5), 2002.
-
(2002)
Mob. Netw. Appl.
, vol.7
, Issue.5
-
-
Ross, S.J.1
Hill, J.L.2
Chen, M.Y.3
Joseph, A.D.4
Culler, D.E.5
Brewer, E.A.6
-
20
-
-
84941162494
-
Sorting through the hype of ubiquitous secure remote access and SSL VPNs
-
Ken Salchow. Sorting through the hype of ubiquitous secure remote access and SSL VPNs. SecurityDocs white paper, http://www.securitydocs.com/library/3103.
-
SecurityDocs White Paper
-
-
Salchow, K.1
-
23
-
-
84941164613
-
Google desktop search: Security threat?
-
Tom Spring. Google Desktop Search: Security Threat? Today@PCWorld. http://blogs.pcworld.com/staffblog/archives/000264.html
-
Today@PCWorld
-
-
Spring, T.1
-
24
-
-
0009511034
-
-
RealVNC Ltd.
-
T. Richardson, RealVNC Ltd. The RFB Protocol, 2005. http://www.realvnc.com/docs/rfbproto.pdf.
-
(2005)
The RFB Protocol
-
-
Richardson, T.1
-
25
-
-
4544352621
-
Information Voyeurism: Social impact; of physically large displays on information privacy
-
ACM
-
Desney S. Tan and Mary Czerwinski. Information Voyeurism: Social impact; of physically large displays on information privacy. In Extended Abstracts of CHI 2003. ACM, 2003.
-
(2003)
Extended Abstracts of CHI 2003
-
-
Tan, D.S.1
Czerwinski, M.2
-
26
-
-
0141502168
-
The personal server: Changing the way we think about ubiquitous computing
-
Springer-Verlag
-
Roy Want, Trevor Pering, Gunner Danneels, Muthu Kumar, Murali Sundar, and John Light. The personal server: Changing the way we think about ubiquitous computing. In Proceedings of UbiComp 2002. Springer-Verlag, 2002.
-
(2002)
Proceedings of UbiComp 2002
-
-
Want, R.1
Pering, T.2
Danneels, G.3
Kumar, M.4
Sundar, M.5
Light, J.6
-
27
-
-
84941160507
-
SSH transport layer protocol
-
T. Ylonen. SSH transport layer protocol. RFC 3667.
-
RFC
, vol.3667
-
-
Ylonen, T.1
-
28
-
-
33745886052
-
The awareness-privacy tradeoff in video supported informal awareness: A study of image-filtering based techniques
-
Georgia Institute of Technology
-
Qiang Alex Zhao and John T. Stasko. The awareness-privacy tradeoff in video supported informal awareness: A study of image-filtering based techniques. Technical Report 98-16, Georgia Institute of Technology, 1998.
-
(1998)
Technical Report
, vol.98
, Issue.16
-
-
Qiang Alex Zhao1
Stasko, J.T.2
|