Sciweavers

1068 search results - page 211 / 214
» On the Relationship between Models for Learning in Helpful E...
Sort
View
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
14 years 2 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
LRE
2006
175views more  LRE 2006»
13 years 7 months ago
Automatically generating related queries in Japanese
Web searchers reformulate their queries, as they adapt to search engine behavior, learn more about a topic, or simply correct typing errors. Automatic query rewriting can help user...
Rosie Jones, Kevin Bartz, Pero Subasic, Benjamin R...
JAIR
2010
142views more  JAIR 2010»
13 years 6 months ago
Context-based Word Acquisition for Situated Dialogue in a Virtual World
To tackle the vocabulary problem in conversational systems, previous work has applied unsupervised learning approaches on co-occurring speech and eye gaze during interaction to au...
Shaolin Qu, Joyce Yue Chai
NORDICHI
2004
ACM
14 years 29 days ago
Procuring a usable system using unemployed personas
This case study examines a procurement project where the Swedish National Labor Market Administration (AMV) hired usability consultants in order to redesign their website for empl...
Erik Markensten, Henrik Artman
CHI
2005
ACM
14 years 8 months ago
Studying the effectiveness of MOVE: a contextually optimized in-vehicle navigation system
In-vehicle navigation has changed substantially in recent years, due to the advent of computer generated maps and directions. However, these maps are still problematic, due to a m...
Joonhwan Lee, Jodi Forlizzi, Scott E. Hudson