Sciweavers

662 search results - page 22 / 133
» Adventures in Personalized Information Access
Sort
View
FC
2007
Springer
117views Cryptology» more  FC 2007»
14 years 1 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
CSB
2003
IEEE
113views Bioinformatics» more  CSB 2003»
14 years 1 months ago
A Personalized and Automated dbSNP Surveillance System
The development of high throughput techniques and large-scale studies in the biological sciences has given rise to an explosive growth in both the volume and types of data availab...
Shuo Liu, Steve Lin, Mark Woon, Teri E. Klein, Rus...
DMKD
2000
ACM
165views Data Mining» more  DMKD 2000»
14 years 2 days ago
On Mining Web Access Logs
The proliferation of information on the world wide web has made the personalization of this information space a necessity. One possible approach to web personalization is to mine ...
Anupam Joshi, Raghu Krishnapuram
AUIC
2004
IEEE
13 years 11 months ago
Visualization of Travel Itinerary Information on PDAs
Conventional travel itineraries list travel related information, such as flights and hotel bookings, in a chronological order of date and time. As such the only observable relatio...
Masood Masoodian, Daryl Budd
TRUSTBUS
2010
Springer
13 years 6 months ago
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation
: European data protection regulation states that organisations must have data subjects’ consent to use their personally identifiable information (PII) for a variety of purposes....
Gina Kounga, Marco Casassa Mont, Pete Bramhall