Sciweavers

592 search results - page 8 / 119
» Learning of personalized security settings
Sort
View
EWCBR
2008
Springer
13 years 9 months ago
Knowledge Planning and Learned Personalization for Web-Based Case Adaptation
How to endow case-based reasoning systems with effective case adaptation capabilities is a classic problem. A significant impediment to developing automated adaptation procedures i...
David B. Leake, Jay H. Powell
SPW
1999
Springer
13 years 12 months ago
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
In the near future, many personal electronic devices will be able to communicate with each other over a short range wireless channel. We investigate the principal security issues f...
Frank Stajano, Ross J. Anderson
PERCOM
2007
ACM
14 years 7 months ago
Challenges for Pervasive RFID-Based Infrastructures
The success of RFID in supply chain management is leading many to consider more personal and pervasive deployments of this technology. Unlike industrial settings, however, deploym...
Evan Welbourne, Magdalena Balazinska, Gaetano Borr...
CEAS
2007
Springer
14 years 1 months ago
Combining Global and Personal Anti-Spam Filtering
Many of the first successful applications of statistical learning to anti-spam filtering were personalized classifiers that were trained on an individual user’s spam and ham ...
Richard Segal
CCS
2006
ACM
13 years 11 months ago
Finding the original point set hidden among chaff
In biometric identification, a fingerprint is typically represented as a set of minutiae which are 2D points. A method [4] to protect the fingerprint template hides the minutiae b...
Ee-Chien Chang, Ren Shen, Francis Weijian Teo