Sciweavers

1981 search results - page 353 / 397
» A Web User Profiling Approach
Sort
View
ICICS
2005
Springer
14 years 2 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
SIGUCCS
2000
ACM
14 years 1 months ago
Remedial Help Desk 101 at Florida State University
The User Services division of the Office of Technology Integration is the "safety net" for computer support at Florida State University (FSU). Areas of support include t...
Diana Orrick, Jeff Bauer, Ernest McDuffie
WWW
2011
ACM
13 years 3 months ago
Search result diversity for informational queries
Ambiguous queries constitute a significant fraction of search instances and pose real challenges to web search engines. With current approaches the top results for these queries ...
Michael J. Welch, Junghoo Cho, Christopher Olston
CHI
2011
ACM
13 years 12 days ago
TapBack: towards richer mobile interfaces in impoverished contexts
Much of the mobile work by HCI researchers explores a future world populated by high-end devices and relatively affluent users. This paper turns to consider the hundreds of milli...
Simon Robinson, Nitendra Rajput, Matt Jones, Anupa...
EFDBS
2000
13 years 10 months ago
Citation Linking in Federated Digital Libraries
Today, bibliographical information is kept in a variety of data sources world wide, some of them publically available, and some of them also offering information about citations m...
Eike Schallehn, Martin Endig, Kai-Uwe Sattler