Sciweavers

2084 search results - page 263 / 417
» Knowledge Exploitation from the Web
Sort
View
CTRSA
2004
Springer
106views Cryptology» more  CTRSA 2004»
14 years 2 months ago
Improving Robustness of PGP Keyrings by Conflict Detection
Abstract. Secure authentication frequently depends on the correct recognition of a user's public key. When there is no certificate authority, this key is obtained from other u...
Qinglin Jiang, Douglas S. Reeves, Peng Ning
HCI
2007
14 years 7 days ago
Providing Universal Accessibility Using Connecting Ontologies: A Holistic Approach
Accessibility implementation efforts are generally focused towards some typical user impairments and a few interaction devices for a particular user scenario. Whereas there are num...
Shuaib Karim, Khalid Latif, A. Min Tjoa
SIGSOFT
2003
ACM
14 years 11 months ago
Runtime safety analysis of multithreaded programs
Foundational and scalable techniques for runtime safety analysis of multithreaded programs are explored in this paper. A technique based on vector clocks to extract the causal dep...
Koushik Sen, Grigore Rosu, Gul Agha
HICSS
2009
IEEE
101views Biometrics» more  HICSS 2009»
14 years 5 months ago
Virtual Communities: A Bibliometric Analysis
Virtual communities are a popular phenomenon today. They are significantly altering the specifics of how people work, spend their free time and interact socially. Moreover, they h...
Mikko O. J. Laine
ICALT
2010
IEEE
13 years 11 months ago
Towards a Competence Based System for Recommending Study Materials (CBSR)
— Most e-learning systems require intervention from a teacher. The development of adaptive hypermedia systems, such as intelligent tutoring systems, aimed to reduce the teachersâ...
Athitaya Nitchot, Lester Gilbert, Gary B. Wills