Sciweavers

480 search results - page 40 / 96
» Portrait: Generating Personal Presentations
Sort
View
SIGIR
2004
ACM
15 years 10 months ago
Implicit queries (IQ) for contextualized search
The Implicit Query (IQ) prototype is a system which automatically generates context-sensitive searches based on a user’s current computing activities. In the demo, we show IQ ru...
Susan T. Dumais, Edward Cutrell, Raman Sarin, Eric...
FIS
2008
15 years 6 months ago
Unlock Your Data: The Case of MyTag
The business model of Web2.0 applications like FaceBook, Flickr, YouTube and their likes is based on an asymmetry: Users generate content, Web2.0 application providers own, (i), th...
Thomas Franz, Klaas Dellschaft, Steffen Staab
IUI
2004
ACM
15 years 10 months ago
What would they think?: a computational model of attitudes
A key to improving at any task is frequent feedback from people whose opinions we care about: our family, friends, mentors, and the experts. However, such input is not usually ava...
Hugo Liu, Pattie Maes
JCDL
2004
ACM
198views Education» more  JCDL 2004»
15 years 10 months ago
Finding authoritative people from the web
Today’s web is so huge and diverse that it arguably reflects the real world. For this reason, searching the web is a promising approach to find things in the real world. This ...
Masanori Harada, Shin-ya Sato, Kazuhiro Kazama
PAIRING
2010
Springer
152views Cryptology» more  PAIRING 2010»
15 years 2 months ago
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these dev...
Koen Simoens, Roel Peeters, Bart Preneel