Sciweavers

3042 search results - page 27 / 609
» Designing for all users: including the odd users
Sort
View
UM
2010
Springer
13 years 7 months ago
User Modeling for Telecommunication Applications: Experiences and Practical Implications
Abstract. Telecommunication applications based on user modeling focus on extracting customer behavior and preferences from the information implicitly included in Call Detail Record...
Heath Hohwald, Enrique Frías-Martíne...
GLOBECOM
2007
IEEE
14 years 3 months ago
An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks
—Over the last few years, many researchers have paid a lot of attention to the user authentication problem. However, to date, there has been relatively little research suited for...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
MOZ
2004
Springer
14 years 2 months ago
Strasheela: Design and Usage of a Music Composition Environment Based on the Oz Programming Model
Strasheela provides a means for the composer to create a symbolic score by formally describing it in a rule-based way. The environment defines a rich music representation for comp...
Torsten Anders, Christina Anagnostopoulou, Michael...
GCC
2005
Springer
14 years 2 months ago
An Adaptive Service Strategy Based on User Rating in P2P
In order to deal with free riding in P2P system, incentive mechanism or rating system is presented, and each user rating is computed by itself, which causes that some users exagger...
Jianming Fu, Lei Zhang, Weinan Li, Huanguo Zhang
ICOIN
2004
Springer
14 years 2 months ago
On Layered VPN Architecture for Enabling User-Based Multiply Associated VPNs
Abstract. In our previous work, we have proposed a new VPN architecture for enabling user-based multiply associated VPNs [1]. Almost all existing VPN technologies assume that users...
Yoshihiro Hara, Hiroyuki Ohsaki, Makoto Imase, Yos...