Sciweavers

2650 search results - page 182 / 530
» Personalization in E-Commerce Applications
Sort
View
COLCOM
2009
IEEE
14 years 3 months ago
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations
— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...
INAP
2001
Springer
14 years 2 months ago
Defeasible Logic
We often reach conclusions partially on the basis that we do not have evidence that the conclusion is false. A newspaper story warning that the local water supply has been contamin...
Donald Nute
CHI
2000
ACM
14 years 2 months ago
Two-handed input using a PDA and a mouse
We performed several experiments using a Personal Digital Assistant (PDA) as an input device in the nondominant hand along with a mouse in the dominant hand. A PDA is a small hand...
Brad A. Myers, Kin Pou Lie, Bo-Chieh Yang
ICCCN
1998
IEEE
14 years 2 months ago
An Evolutionary Approach to Multilaterally Secure Services in ISDN / IN
Data protection and data security become more significant since telecommunication services and innovative applications based on these services handle an increasing amount of sensi...
Reiner Sailer
ICB
2007
Springer
121views Biometrics» more  ICB 2007»
14 years 2 months ago
SVDD-Based Illumination Compensation for Face Recognition
Illumination change is one of most important and difficult problems which prevent from applying face recognition to real applications. For solving this, we propose a method to comp...
Sang-Woong Lee, Seong-Whan Lee