Sciweavers

1981 search results - page 316 / 397
» A Web User Profiling Approach
Sort
View
CSE
2009
IEEE
14 years 3 months ago
Security and Trust through Electronic Social Network-Based Interactions
—The success of a Public Key Infrastructure such as the Web of Trust (WoT) heavily depends on its ability to ensure that public keys are used by their legitimate owners, thereby ...
Patrik Bichsel, Samuel Müller, Franz-Stefan P...
IADIS
2008
13 years 10 months ago
Autonomous Presentation Capture In Corporate And Educational Settings
While researchers have been exploring automatic presentation capture since the 1990's, real world adoption has been limited. Our research focuses on simplifying presentation ...
David M. Hilbert, Thea Turner, Laurent Denoue, Kan...
COMPSAC
2008
IEEE
14 years 3 months ago
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider
—Internet users interact with multiple Web Service Providers (WSP), and therefore, must remember and manage multiple passwords. Users try to overcome the burden of password manag...
Golnaz Elahi, Zeev Lieber, Eric S. K. Yu
CONTEXT
2001
Springer
14 years 1 months ago
WordSieve: A Method for Real-Time Context Extraction
Abstract. In order to be useful, intelligent information retrieval agents must provide their users with context-relevant information. This paper presents WordSieve, an algorithm fo...
Travis Bauer, David B. Leake
CORR
2007
Springer
162views Education» more  CORR 2007»
13 years 9 months ago
Exploiting Social Annotation for Automatic Resource Discovery
Information integration applications, such as mediators or mashups, that require access to information resources currently rely on users manually discovering and integrating them ...
Anon Plangprasopchok, Kristina Lerman