Sciweavers

15379 search results - page 275 / 3076
» Protecting users from
Sort
View
ACSAC
1999
IEEE
14 years 18 days ago
User Authentication and Authorization in the Java(tm) Platform
JavaTM security technology originally focused on creating a safe environment in which to run potentially untrusted code downloaded from the public network. With the latest release...
Charlie Lai, Li Gong, Larry Koved, Anthony J. Nada...
LREC
2010
171views Education» more  LREC 2010»
13 years 9 months ago
Assessing the Impact of English Language Skills and Education Level on PubMed Searches by Dutch-speaking Users
The aim of this study was to assess the retrieval effectiveness of nursing students in the Dutch-speaking part of Belgium. We tested two groups: students from the master Nursing a...
Klaar Vanopstal, Robert Vander Stichele, Godelieve...
AAAI
2004
13 years 9 months ago
Fuzzy Induction in Dynamic User Profiling for Information Filtering
one. The assignment of the weights is performed according to the following two conditions: 1) The sum of weights assigned to the links outgoing from the original keyword has to be ...
Rafal A. Angryk, Costin Barbu
CORR
2008
Springer
102views Education» more  CORR 2008»
13 years 8 months ago
Breaking Out of the Cell: On The Benefits of a New Spreadsheet User-Interaction Paradigm
Contemporary spreadsheets are plagued by a profusion of errors, auditing difficulties, lack of uniform development methodologies, and barriers to easy comprehension of the underly...
Ziv Hellman
JNW
2008
146views more  JNW 2008»
13 years 6 months ago
User Behavior and IM Topology Analysis
The use of Instant Messaging, or IM, has become widely adopted in private and corporate communication. They can provide instant, multi-directed and multi-types of communications wh...
Qiang Yan, Xiaoyan Huang