Sciweavers

79 search results - page 13 / 16
» Challenges and Research Directions for Adaptive Biometric Re...
Sort
View
HICSS
2010
IEEE
171views Biometrics» more  HICSS 2010»
14 years 2 months ago
Developing Reliable Measures of Privacy Management within Social Networking Sites
Social networking sites and other examples of online social spaces have greatly expanded their members’ opportunities for self expression and social interaction, while creating ...
Catherine Dwyer, Starr Roxanne Hiltz, Marshall Sco...
HICSS
2002
IEEE
113views Biometrics» more  HICSS 2002»
14 years 13 days ago
Persona: A Contextualized and Personalized Web Search
Abstract— Recent advances in graph-based search techniques derived from Kleinberg’s work [1] have been impressive. This paper further improves the graph-based search algorithm ...
Francisco Tanudjaja, Lik Mu
HICSS
2003
IEEE
182views Biometrics» more  HICSS 2003»
14 years 23 days ago
Business Intelligence Explorer: A Knowledge Map Framework for Discovering Business Intelligence on the Web
Nowadays, information overload hinders the discovery of business intelligence on the World Wide Web. Existing business intelligence tools suffer from a lack of analysis and visual...
Wingyan Chung, Hsinchun Chen, Jay F. Nunamaker
CONEXT
2006
ACM
14 years 1 months ago
Proposition of a cross-layer architecture model for the support of QoS in ad-hoc networks
Due to the lack of built-in quality of service support, IEEE 802.11 ad-hoc networks presents serious defies in meeting the demands of multimedia applications. To overcome such ch...
Wafa Berrayana, Habib Youssef, Stéphane Loh...
ICSE
2010
IEEE-ACM
13 years 9 months ago
Requirements reflection: requirements as runtime entities
Computational reflection is a well-established technique that gives a program the ability to dynamically observe and possibly modify its behaviour. To date, however, reflection is...
Nelly Bencomo, Jon Whittle, Peter Sawyer, Anthony ...