Sciweavers

15379 search results - page 239 / 3076
» Protecting users from
Sort
View
PERCOM
2004
ACM
14 years 7 months ago
A User-Guided Cognitive Agent for Network Service Selection in Pervasive Computing Environments
Connectivity is central to pervasive computing environments. We seek to catalyze a world of rich and diverse connectivity through technologies that drastically simplify the task o...
George Lee, Peyman Faratin, Steven Bauer, John Wro...
FQAS
2009
Springer
186views Database» more  FQAS 2009»
13 years 6 months ago
Dynamically Personalizing Search Results for Mobile Users
Abstract. We introduce a novel situation-aware approach to personalize search results for mobile users. By providing a mobile user with appropriate information that dynamically sat...
Ourdia Bouidghaghen, Lynda Tamine-Lechani, Mohand ...
ICMCS
2006
IEEE
129views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Modeling Interactions from Email Communication
Email plays an important role as a medium for the spread of information, ideas, and influence among its users. We present a framework to learn topic-based interactions between pa...
Dong Zhang, Daniel Gatica-Perez, Deb Roy, Samy Ben...
CCS
2005
ACM
14 years 1 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
ISCA
2010
IEEE
239views Hardware» more  ISCA 2010»
14 years 1 months ago
Sentry: light-weight auxiliary memory access control
Light-weight, flexible access control, which allows software to regulate reads and writes to any granularity of memory region, can help improve the reliability of today’s multi...
Arrvindh Shriraman, Sandhya Dwarkadas