Sciweavers

16160 search results - page 119 / 3232
» How to approach humans
Sort
View
SEMWEB
2004
Springer
14 years 1 months ago
How to Build Google2Google - An (Incomplete) Recipe
Abstract. This talk explores aspects relevant for peer-to-peer search infrastructures, which we think are better suited to semantic web search than centralized approaches. It does ...
Wolfgang Nejdl
ICDCSW
2002
IEEE
14 years 1 months ago
Event Systems: How to Have Your Cake and Eat It Too
This paper addresses the fundamental tradeoffs in event systems between scalability (of event filtering, routing, and delivery mechanisms), expressiveness (when describing intere...
Patrick Th. Eugster, Pascal Felber, Rachid Guerrao...
ICIAR
2010
Springer
14 years 1 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl
ACSAC
1998
IEEE
14 years 14 days ago
How to Increase Security in Mobile Networks by Anomaly Detection
The increasing complexity of cellular radio networks yields new demands concerning network security. Especially the task of detecting, repulsing and preventing abuse both by in- a...
Roland Büschkes, Dogan Kesdogan, Peter Reichl
KI
1992
Springer
14 years 8 days ago
How to Construct a Logic for Your Application
Abstract. The purpose of this note is to present and evaluate the options available to a researcher wishing to use logic for representation, reasoning and computation in his applic...
Dov M. Gabbay