Sciweavers

1981 search results - page 251 / 397
» A Web User Profiling Approach
Sort
View
110
Voted
IEEEARES
2007
IEEE
15 years 8 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
KBSE
2007
IEEE
15 years 8 months ago
Iterative model-driven development of adaptable service-based applications
Flexibility and interoperability make web services well suited for designing highly-customizable reactive service-based applications, that is interactive applications that can be ...
Leen Lambers, Hartmut Ehrig, Leonardo Mariani, Mau...
CHI
2004
ACM
16 years 2 months ago
IDeixis: image-based Deixis for finding location-based information
In this paper we describe an image-based approach to finding location-based information from camera-equipped mobile devices. We introduce a point-by-photograph paradigm, where user...
Tom Yeh, Konrad Tollmar, Trevor Darrell
KDD
1997
ACM
130views Data Mining» more  KDD 1997»
15 years 6 months ago
Process-Based Database Support for the Early Indicator Method
In Wirth t Reinartz (1996), we introduced the early indicator method, a multi-strategy approach for the efficient prediction of various aspectsof the fault profile of a set of car...
Christoph Breitner, Jörg Schlösser, R&uu...
MA
1997
Springer
149views Communications» more  MA 1997»
15 years 6 months ago
Java-Based Mobile Agents - How to Migrate, Persist, and Interact on Electronic Service Markets
This paper presents a mobile agent approach that aims at satisfying the following requirements of open Internet-based electronic service markets: the mobile agent system should be...
Boris Liberman, Frank Griffel, Michael Merz, Winfr...