Sciweavers

2614 search results - page 440 / 523
» Information System Architectures: From Art to Science
Sort
View
CHI
2009
ACM
14 years 8 months ago
Taking the time to care: empowering low health literacy hospital patients with virtual nurse agents
Ninety million Americans have inadequate health literacy, resulting in a reduced ability to read and follow directions in the healthcare environment. We describe an animated, empa...
Timothy W. Bickmore, Laura M. Pfeifer, Brian W. Ja...
CORR
2011
Springer
196views Education» more  CORR 2011»
12 years 11 months ago
Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions
In this paper, we study methods for improving the utility and privacy of reputation scores for online auctions, such as used in eBay, so as to reduce the effectiveness of feedbac...
Michael T. Goodrich, Florian Kerschbaum
IMC
2004
ACM
14 years 1 months ago
Measurement based characterization and provisioning of IP VPNs
Virtual Private Networks provide secure and reliable communication between customer sites. With increase in number and size of VPNs, providers need efficient provisioning techniqu...
Satish Raghunath, K. K. Ramakrishnan, Shivkumar Ka...
ANLP
1997
106views more  ANLP 1997»
13 years 9 months ago
Incremental Finite-State Parsing
This paper describes a new finite-state shallow parser. It merges constructive and reductionist approaches within a highly modular architecture. Syntactic information is added at ...
Salah Ait-Mokhtar, Jean-Pierre Chanod
ISI
2008
Springer
13 years 7 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham