Sciweavers

2436 search results - page 415 / 488
» Evaluating Adaptive Problem Selection
Sort
View
CHI
2010
ACM
14 years 4 months ago
The secure haptic keypad: a tactile password system
Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
Andrea Bianchi, Ian Oakley, Dong Soo Kwon
ENTER
2009
Springer
14 years 4 months ago
Personalized Mobile City Transport Advisory System
Mobile devices are becoming an inseparable part of our lives and personalized location-based mobile services are gaining more and more popularity. The scope of this paper is to il...
Gytis Tumas, Francesco Ricci
CSMR
2009
IEEE
14 years 4 months ago
Identification of Extract Method Refactoring Opportunities
Extract Method has been recognized as one of the most important refactorings, since it decomposes large methods and can be used in combination with other refactorings for fixing a...
Nikolaos Tsantalis, Alexander Chatzigeorgiou
GLOBECOM
2009
IEEE
14 years 4 months ago
Multiple Radio Channel Assignement Utilizing Partially Overlapped Channels
— Existing channel assignment algorithms designed for multi-radio multi-channel wireless mesh networks (MRMC-WMN) mainly deal with orthogonal or nonoverlapped channels. But in re...
Mohammad Asadul Hoque, Xiaoyan Hong, Farhana Afroz
IAT
2009
IEEE
14 years 4 months ago
Social Trust-Aware Recommendation System: A T-Index Approach
Collaborative Filtering based on similarity suffers from a variety of problems such as sparsity and scalability. In this paper, we propose an ontological model of trust between us...
Alireza Zarghami, Soude Fazeli, Nima Dokoohaki, Mi...