Sciweavers

15379 search results - page 122 / 3076
» Protecting users from
Sort
View
ICCS
2004
Springer
14 years 1 months ago
Trusted Group Membership Service for JXTA
This paper presents Group Membership Service for JXTA extended with single or bi-directional authentication. The proposed solution exploits certificates and PKI (Public Key Infrast...
Lukasz Kawulok, Krzysztof Zielinski, Michal Jaesch...
IVA
2009
Springer
14 years 2 months ago
Predicting User Psychological Characteristics from Interactions with Empathetic Virtual Agents
Enabling virtual agents to quickly and accurately infer users’ psychological characteristics such as their personality could support a broad range of applications in education, t...
Jennifer L. Robison, Jonathan P. Rowe, Scott W. Mc...
ECIR
2008
Springer
13 years 9 months ago
A Comparison of Named Entity Patterns from a User Analysis and a System Analysis
This paper investigates the detection of named entity (NE) patterns by comparing the results of NE patterns resulting from a user analysis and a system analysis. Findings revealed ...
Masnizah Mohd, Fabio Crestani, Ian Ruthven
RE
1999
Springer
14 years 3 days ago
Generating User Interface Prototypes from Scenarios
Requirements capture by scenarios and user interface prototyping have become popular techniques. Yet, the transition from scenarios to formal specifications is still ill-defined, ...
Mohammed Elkoutbi, Ismaïl Khriss, Rudolf K. K...
CNSR
2004
IEEE
180views Communications» more  CNSR 2004»
13 years 11 months ago
The Reconstruction of User Sessions from a Server Log Using Improved Time-Oriented Heuristics
Web usage mining plays an important role in the personalization of Web services, adaptation of Web sites, and the improvement of Web server performance. It applies data mining tec...
Jie Zhang, Ali A. Ghorbani