Sciweavers

70 search results - page 9 / 14
» Exploiting the Annotation Practice for Personal and Collecti...
Sort
View
PERCOM
2007
ACM
14 years 7 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
AAAI
2008
13 years 9 months ago
Automating To-Do Lists for Users: Interpretation of To-Dos for Selecting and Tasking Agents
To-do lists have been found to be the most popular personal information management tools, yet there is no automated system to interpret and act upon them when appropriate on behal...
Yolanda Gil, Varun Ratnakar
CIKM
2008
Springer
13 years 9 months ago
Event gazetteers for navigating humanities resources
In history and the other humanities, events and narrative sequences of events are often of primary interest. Yet while named events sometimes appear as subject headings, systems f...
Ryan Shaw
KI
2004
Springer
14 years 24 days ago
SmartWeb: Mobile Applications of the Semantic Web
Abstract Recent progress in mobile broadband communication and semantic web technology is enabling innovative internet services that provide advanced personalization and localizati...
Wolfgang Wahlster
SIGDIAL
2010
13 years 5 months ago
Towards an Empirically Motivated Typology of Follow-Up Questions: The Role of Dialogue Context
A central problem in Interactive Question Answering (IQA) is how to answer Follow-Up Questions (FU Qs), possibly by taking advantage of information from the dialogue context. We a...
Manuel Kirschner, Raffaella Bernardi