Sciweavers

15379 search results - page 329 / 3076
» Protecting users from
Sort
View
157
Voted
ALGOSENSORS
2010
Springer
15 years 2 months ago
From Key Predistribution to Key Redistribution
One of crucial disadvantages of key predistribution schemes for ad hoc networks is that if devices A and B use a shared key K to determine their session keys, then any adversarial...
Jacek Cichon, Zbigniew Golebiewski, Miroslaw Kutyl...
134
Voted
WWW
2009
ACM
16 years 4 months ago
Discovering user profiles
In this paper we describe techniques for the discovery and construction of user profiles. Leveraging from the emergent data web, our system addresses the problem of sparseness of ...
Riddhiman Ghosh, Mohamed Dekhil
119
Voted
ECIR
2009
Springer
16 years 26 days ago
Representing User Navigation in XML Retrieval with Structural Summaries
Abstract. This poster presents a novel way to represent user navigation in XML retrieval using collection statistics from XML summaries. Currently, developing user navigation model...
Mir Sadek Ali, Mariano P. Consens, Birger Larsen
126
Voted
ICSM
1994
IEEE
15 years 7 months ago
Domain-Retargetable Reverse Engineering II: Personalized User Interfaces
The user interface is an integral part of any application. This is especially true for reverse engineering environments, since the understanding process depends both on the user&#...
Scott R. Tilley
126
Voted
EHCI
2004
15 years 5 months ago
Using Interaction Style to Match the Ubiquitous User Interface to the Device-to-Hand
Ubiquitous computing requires a multitude of devices to have access ame services. Abstract specifications of user interfaces are designed to separate the definition of a user inter...
Stephen W. Gilroy, Michael D. Harrison