Sciweavers

8760 search results - page 1608 / 1752
» Modeling users of intelligent systems
Sort
View
GI
2004
Springer
15 years 10 months ago
Contractual Relationships in Open Source Structures
: The article provides an overview of the legal relationships in Open Source Structures. It shows that – as within all software development and distribution models – different ...
Carsten Schulz
MM
2003
ACM
160views Multimedia» more  MM 2003»
15 years 10 months ago
VideoQA: question answering on news video
When querying a news video archive, the users are interested in retrieving precise answers in the form of a summary that best answers the query. However, current video retrieval s...
Hui Yang, Lekha Chaisorn, Yunlong Zhao, Shi-Yong N...
147
Voted
SIGMOD
2010
ACM
189views Database» more  SIGMOD 2010»
15 years 9 months ago
Recsplorer: recommendation algorithms based on precedence mining
We study recommendations in applications where there are temporal patterns in the way items are consumed or watched. For example, a student who has taken the Advanced Algorithms c...
Aditya G. Parameswaran, Georgia Koutrika, Benjamin...
CCS
2009
ACM
15 years 9 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
140
Voted
EDCC
1994
Springer
15 years 8 months ago
Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach
Security and reliability issues in distributed systems have been investigated for several years at LAAS using a technique called Fragmentation-Redundancy-Scattering (FRS). The aim ...
Jean-Charles Fabre, Yves Deswarte, Brian Randell
« Prev « First page 1608 / 1752 Last » Next »