Sciweavers

15379 search results - page 122 / 3076
» Protecting users from
Sort
View
85
Voted
ICCS
2004
Springer
15 years 9 months ago
Trusted Group Membership Service for JXTA
This paper presents Group Membership Service for JXTA extended with single or bi-directional authentication. The proposed solution exploits certificates and PKI (Public Key Infrast...
Lukasz Kawulok, Krzysztof Zielinski, Michal Jaesch...
104
Voted
IVA
2009
Springer
15 years 10 months ago
Predicting User Psychological Characteristics from Interactions with Empathetic Virtual Agents
Enabling virtual agents to quickly and accurately infer users’ psychological characteristics such as their personality could support a broad range of applications in education, t...
Jennifer L. Robison, Jonathan P. Rowe, Scott W. Mc...
100
Voted
ECIR
2008
Springer
15 years 5 months ago
A Comparison of Named Entity Patterns from a User Analysis and a System Analysis
This paper investigates the detection of named entity (NE) patterns by comparing the results of NE patterns resulting from a user analysis and a system analysis. Findings revealed ...
Masnizah Mohd, Fabio Crestani, Ian Ruthven
133
Voted
RE
1999
Springer
15 years 7 months ago
Generating User Interface Prototypes from Scenarios
Requirements capture by scenarios and user interface prototyping have become popular techniques. Yet, the transition from scenarios to formal specifications is still ill-defined, ...
Mohammed Elkoutbi, Ismaïl Khriss, Rudolf K. K...
155
Voted
CNSR
2004
IEEE
180views Communications» more  CNSR 2004»
15 years 7 months ago
The Reconstruction of User Sessions from a Server Log Using Improved Time-Oriented Heuristics
Web usage mining plays an important role in the personalization of Web services, adaptation of Web sites, and the improvement of Web server performance. It applies data mining tec...
Jie Zhang, Ali A. Ghorbani