Sciweavers

784 search results - page 33 / 157
» Personalizing access to learning networks
Sort
View
TMC
2010
179views more  TMC 2010»
13 years 7 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
CONTEXT
2007
Springer
14 years 22 days ago
A Personalized Retrieval Model based on Influence Diagrams
Abstract. A key challenge in information retrieval is the use of contextual evidence within ad-hoc retrieval. Our contribution is particularly based on the belief that contextual r...
Nesrine Zemirli, Lynda Tamine, Mohand Boughanem
CVPR
2007
IEEE
14 years 10 months ago
Biased Manifold Embedding: A Framework for Person-Independent Head Pose Estimation
The estimation of head pose angle from face images is an integral component of face recognition systems, human computer interfaces and other human-centered computing applications....
Vineeth Nallure Balasubramanian, Jieping Ye, Sethu...
LWA
2008
13 years 10 months ago
Learning to Cope with Critical Situations - An Agent based Approach
How does someone react when he faces a critical situation in his life? In this paper we present an initial initial implementation architecture based on a simulation model described...
Régis Newo, Klaus-Dieter Althoff
WWW
2009
ACM
14 years 9 months ago
Automated construction of web accessibility models from transaction click-streams
Screen readers, the dominant assistive technology used by visually impaired people to access the Web, function by speaking out the content of the screen serially. Using screen rea...
Jalal Mahmud, Yevgen Borodin, I. V. Ramakrishnan, ...