Sciweavers

15379 search results - page 286 / 3076
» Protecting users from
Sort
View
IEEEARES
2006
IEEE
14 years 2 months ago
Secure 3G User Authentication in Adhoc Serving Networks
The convergence of cellular and IP technologies has pushed the integration of 3G and WLAN networks to the forefront. Gaining secure access to 3G services from 802.11 WLANs is a pr...
Arjan Durresi, Lyn Evans, Vamsi Paruchuri, Leonard...
ICMCS
2005
IEEE
103views Multimedia» more  ICMCS 2005»
14 years 1 months ago
User Study for Generating Personalized Summary Profiles
The need for personalized summaries of media content has been driven by the recent and anticipated explosive growth in the media world. In this paper we present a methodology and ...
Lalitha Agnihotri, John R. Kender, Nevenka Dimitro...
IUI
2005
ACM
14 years 1 months ago
A framework for designing intelligent task-oriented augmented reality user interfaces
A task-oriented space can benefit from an augmented reality interface that layers the existing tools and surfaces with useful information to make cooking more easy, safe and effic...
Leonardo Bonanni, Chia-Hsun Lee, Ted Selker
IBPRIA
2003
Springer
14 years 1 months ago
A User Authentication Technic Using a~Web Interaction Monitoring System
User authentication based on biometrics has explored both physiological and behavioral characteristics. We present a system, called Web Interaction Display and Monitoring (WIDAM), ...
Hugo Gamboa, Ana L. N. Fred
ICAI
2007
13 years 9 months ago
An Evaluation of the Accuracy of Capturing User Intent for Information Retrieval
Abstract This paper reports our evaluation of the accuracy of capturing a user’s intent in an informationseeking task. Specifically, we would like to assess how accurately a use...
Hien Nguyen, Eugene Santos Jr.