Sciweavers

7984 search results - page 1256 / 1597
» Exploring personal information
Sort
View
USITS
1997
15 years 6 months ago
Lightweight Security Primitives for E-Commerce
Emerging applications in electronic commerce often involve very low-cost transactions, which execute in the context of ongoing, extended clientserver relationships. For example, c...
Yossi Matias, Alain J. Mayer, Abraham Silberschatz
COLING
1996
15 years 6 months ago
Computation of Relative Social Status on the Basis of Honorification in Korean
This paper presents a way to compute relative social status of the individuals involved in Korean dialogue. Every Korean sentence indicates whether honorification occurs in it. Th...
Done-Young Lee
GECCO
2010
Springer
186views Optimization» more  GECCO 2010»
15 years 5 months ago
Genetic rule extraction optimizing brier score
Most highly accurate predictive modeling techniques produce opaque models. When comprehensible models are required, rule extraction is sometimes used to generate a transparent mod...
Ulf Johansson, Rikard König, Lars Niklasson
HPDC
2010
IEEE
15 years 5 months ago
Mendel: efficiently verifying the lineage of data modified in multiple trust domains
Data is routinely created, disseminated, and processed in distributed systems that span multiple administrative domains. To maintain accountability while the data is transformed b...
Ashish Gehani, Minyoung Kim
HUC
2010
Springer
15 years 5 months ago
MoviPill: improving medication compliance for elders using a mobile persuasive social game
Medication compliance is a critical component in the success of any medical treatment. However, only 50% of patients correctly adhere to their prescription regimens. Mobile and ub...
Rodrigo de Oliveira, Mauro Cherubini, Nuria Oliver
« Prev « First page 1256 / 1597 Last » Next »