Sciweavers

662 search results - page 67 / 133
» Adventures in Personalized Information Access
Sort
View
COMPSAC
2006
IEEE
14 years 3 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
ISW
2009
Springer
14 years 3 months ago
Robust Authentication Using Physically Unclonable Functions
Abstract. In this work we utilize a physically unclonable function (PUF) to improve resilience of authentication protocols to various types of compromise. As an example application...
Keith B. Frikken, Marina Blanton, Mikhail J. Atall...
CONTEXT
2007
Springer
14 years 3 months ago
Towards an Adaptation of Semi-structured Document Querying
In our research work, we consider that access to semi-structured documents is carried out by a data-oriented query. With different users and a same query, the returned results are ...
Corinne Amel Zayani, André Péninou, ...
ISWC
1998
IEEE
14 years 1 months ago
Speaking and Listening on the Run: Design for Wearable Audio Computing
The use of speech and auditory interaction on wearable computers can provide an awareness of events and personal messages, without requiring one's full attention or disruptin...
Nitin "Nick" Sawhney, Chris Schmandt
CNSR
2004
IEEE
180views Communications» more  CNSR 2004»
14 years 24 days ago
The Reconstruction of User Sessions from a Server Log Using Improved Time-Oriented Heuristics
Web usage mining plays an important role in the personalization of Web services, adaptation of Web sites, and the improvement of Web server performance. It applies data mining tec...
Jie Zhang, Ali A. Ghorbani