Sciweavers

2786 search results - page 50 / 558
» A broader approach to personalization
Sort
View
FC
2007
Springer
117views Cryptology» more  FC 2007»
14 years 4 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
IV
2006
IEEE
111views Visualization» more  IV 2006»
14 years 4 months ago
Mapping Scientific Disciplines and Author Expertise Based on Personal Bibliography Files
This paper presents a novel approach (1) to define, analyze, and map a scientific discipline and (2) to compare and map the expertise of single authors based on personal bibliogra...
Colin Murray, Weimao Ke, Katy Börner
CSE
2009
IEEE
14 years 2 months ago
Social Tagging in Query Expansion: A New Way for Personalized Web Search
Social networks and collaborative tagging systems are rapidly gaining popularity as primary means for sorting and sharing data: users tag their bookmarks in order to simplify infor...
Claudio Biancalana, Alessandro Micarelli
CEAS
2007
Springer
14 years 4 months ago
Email Communities of Interest
Email has become an integral and sometimes overwhelming part of users’ personal and professional lives. In this paper, we measure the flow and frequency of user email toward th...
Lisa Johansen, Michael Rowell, Kevin R. B. Butler,...
EDBTW
2004
Springer
14 years 3 months ago
The Case for Mobile OLAP
Abstract. On-Line Analytical Processing (OLAP) is a trend in database technology, based on the multidimensional view of data. Numerous applications and development environments exi...
Andreas S. Maniatis