Sciweavers

13370 search results - page 140 / 2674
» Accessibility in Information Retrieval
Sort
View
WPES
2003
ACM
14 years 3 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
CHI
2010
ACM
14 years 5 days ago
Countertop responsive mirror: supporting physical retail shopping for sellers, buyers and companions
We examine opportunities for ubiquitous technologies in retail shopping, jewelry shopping in this case, to supplement the unique information needs inherent to physical trials of t...
Maurice Chu, Brinda Dalal, Alan Walendowski, Bo Be...
NAACL
1994
13 years 11 months ago
Multilingual Text Resources at the Linguistic Data Consortium
The Linguistic Data Consortium (LDC) is currently involved in a major effort to expand its multilingual text resources, in particular for machine translation, message understandin...
David Graft, Rebecca Finc
CIKM
2007
Springer
14 years 4 months ago
Reusing relational sources for semantic information access
The rapid growth of available data arises the need for more sophisticated techniques for semantic access to information. It has been proved that using conceptual model or ontology...
Lina Lubyte
VTC
2010
IEEE
142views Communications» more  VTC 2010»
13 years 8 months ago
Low-Feedback Multiple-Access and Scheduling via Location and Geometry Information
—This paper exploits the use of location information of wireless terminals to improve the performance of a beamforming system and support multiple access. Based on a system provi...
Congzheng Han, Matthew Webb, Angela Doufexi, Mark ...