Sciweavers

2553 search results - page 415 / 511
» How-To Web Pages
Sort
View
NDSS
2009
IEEE
14 years 4 months ago
Safe Passage for Passwords and Other Sensitive Data
The prevalence of malware such as keyloggers and screen scrapers has made the prospect of providing sensitive information via web pages disconcerting for security-conscious users....
Jonathan M. McCune, Adrian Perrig, Michael K. Reit...
IAT
2007
IEEE
14 years 4 months ago
Investigating User Browsing Behavior
This paper describes our efforts to investigate factors in user browsing behavior to automatically evaluate Web pages that the user shows interest in. We developed a client site l...
Ganesan Velayathan, Seiji Yamada
ADAPTIVE
2007
Springer
14 years 4 months ago
Content-Based Recommendation Systems
This chapter discusses content-based recommendation systems, i.e., systems that recommend an item to a user based upon a description of the item and a profile of the user’s inter...
Michael J. Pazzani, Daniel Billsus
CONTEXT
2007
Springer
14 years 4 months ago
Delimited Continuations in Operating Systems
Abstract. Delimited continuations are the meanings of delimited evaluation contexts in programming languages. We show they offer a uniform view of many scenarios that arise in sys...
Oleg Kiselyov, Chung-chieh Shan
DEXA
2007
Springer
115views Database» more  DEXA 2007»
14 years 4 months ago
Ontology Modularization for Knowledge Selection: Experiments and Evaluations
Problems with large monolithical ontologies in terms of reusability, scalability and maintenance have lead to an increasing interest in modularization techniques for ontologies. Cu...
Mathieu d'Aquin, Anne Schlicht, Heiner Stuckenschm...