Sciweavers

690 search results - page 80 / 138
» Multi-Agent Only Knowing
Sort
View
DIM
2008
ACM
13 years 10 months ago
Quantifying the security of preference-based authentication
We describe a technique aimed at addressing longstanding problems for password reset: security and cost. In our approach, users are authenticated using their preferences. Experime...
Markus Jakobsson, Liu Yang, Susanne Wetzel
ER
2008
Springer
134views Database» more  ER 2008»
13 years 10 months ago
On Measuring Process Model Similarity Based on High-Level Change Operations
For various applications there is the need to compare the similarity between two process models. For example, given the as-is and to-be models of a particular business process, we ...
Chen Li, Manfred Reichert, Andreas Wombacher
ESEM
2008
ACM
13 years 10 months ago
Strength of evidence in systematic reviews in software engineering
Systematic reviews are only as good as the evidence they are based on. It is important, therefore, that users of systematic reviews know how much confidence they can place in the ...
Tore Dybå, Torgeir Dingsøyr
ESWS
2008
Springer
13 years 10 months ago
Semantic Reasoning: A Path to New Possibilities of Personalization
Abstract. Recommender systems face up to current information overload by selecting automatically items that match the personal preferences of each user. The so-called content-based...
Yolanda Blanco-Fernández, José J. Pa...
INFOSCALE
2007
ACM
13 years 10 months ago
A model-based WiFi localization method
—Due to the proliferation of WiFi access points, indoor localization methods based on WiFi signal strengths are becoming more and more attractive because they don’t require add...
Dik Lun Lee, Qiuxia Chen