Sciweavers

7366 search results - page 1421 / 1474
» Development of the Information Systems Implementation Resear...
Sort
View
DAWAK
2005
Springer
15 years 9 months ago
Processing Sequential Patterns in Relational Databases
Database integration of data mining has gained popularity and its significance is well recognized. However, the performance of SQL based data mining is known to fall behind specia...
Xuequn Shang, Kai-Uwe Sattler
HICSS
2002
IEEE
113views Biometrics» more  HICSS 2002»
15 years 8 months ago
Persona: A Contextualized and Personalized Web Search
Abstract— Recent advances in graph-based search techniques derived from Kleinberg’s work [1] have been impressive. This paper further improves the graph-based search algorithm ...
Francisco Tanudjaja, Lik Mu
FC
2006
Springer
129views Cryptology» more  FC 2006»
15 years 7 months ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig
CG
2010
Springer
15 years 2 months ago
The effect of task on classification accuracy: Using gesture recognition techniques in free-sketch recognition
Generating, grouping, and labeling free-sketch data is a difficult and time-consuming task for both user study participants and researchers. To simplify this process for both part...
M. Field, S. Gordon, Eric Jeffrey Peterson, R. Rob...
119
Voted
CHI
2004
ACM
16 years 4 months ago
Affective sensors, privacy, and ethical contracts
Sensing affect raises critical privacy concerns, which are examined here using ethical theory, and with a study that illuminates the connection between ethical theory and privacy....
Carson Reynolds, Rosalind W. Picard
« Prev « First page 1421 / 1474 Last » Next »