Sciweavers

2846 search results - page 35 / 570
» Not one click for security
Sort
View
IUI
2000
ACM
15 years 8 months ago
Learning users' interests by unobtrusively observing their normal behavior
For intelligent interfaces attempting to learn a user’s interests, the cost of obtaining labeled training instances is prohibitive because the user must directly label each trai...
Jeremy Goecks, Jude W. Shavlik
CORR
2008
Springer
153views Education» more  CORR 2008»
15 years 4 months ago
A Truthful Mechanism for Offline Ad Slot Scheduling
We consider the Offline Ad Slot Scheduling problem, where advertisers must be scheduled to sponsored search slots during a given period of time. Advertisers specify a budget constr...
Jon Feldman, S. Muthukrishnan, Evdokia Nikolova, M...
CIKM
2010
Springer
15 years 2 months ago
A structured approach to query recommendation with social annotation data
Query recommendation has been recognized as an important mean to help users search and also improve the usability of search engines. Existing approaches mainly focus on helping us...
Jiafeng Guo, Xueqi Cheng, Gu Xu, Huawei Shen
131
Voted
ESORICS
2010
Springer
15 years 5 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
DBSEC
2010
161views Database» more  DBSEC 2010»
15 years 5 months ago
Secure Location Verification - A Security Analysis of GPS Signal Authentication
The use of location based services has increased significantly over the last few years. However, location information is only sparsely used as a security mechanism. One of the reas...
Georg T. Becker, Sherman C. Lo, David S. De Lorenz...