Sciweavers

15379 search results - page 333 / 3076
» Protecting users from
Sort
View
129
Voted
IJMSO
2010
119views more  IJMSO 2010»
15 years 2 months ago
Ontological technologies for user modelling
: This paper brings together research from two different fields – user modelling and web ontologies – in attempt to demonstrate how recent semantic trends in web development ca...
Sergey A. Sosnovsky, Darina Dicheva
149
Voted
WIAMIS
2009
IEEE
15 years 10 months ago
Modelling user attention for human-agent interaction
In this work, we propose a design for a user attention model featuring three core components. Our system components can work in real-time, offering indications of user attention f...
Christopher Peters, Stylianos Asteriadis, Genaro R...
116
Voted
ICASSP
2009
IEEE
15 years 10 months ago
Long-time span acoustic activity analysis from far-field sensors in smart homes
Smart homes for the aging population have recently started attracting the attention of the research community. One of the problems of interest is this of monitoring the activities...
Jing Huang, Xiaodan Zhuang, Vit Libal, Gerasimos P...
132
Voted
IPM
2011
118views more  IPM 2011»
14 years 10 months ago
Detecting spam blogs from blog search results
Blogging has been an emerging media for people to express themselves. However, the presence of spam-blogs (also known as splogs) may reduce the value of blogs and blog search engi...
Linhong Zhu, Aixin Sun, Byron Choi
167
Voted
ASIACRYPT
2011
Springer
14 years 3 months ago
Leakage-Resilient Cryptography from the Inner-Product Extractor
We present a generic method to secure various widely-used cryptosystems against arbitrary side-channel leakage, as long as the leakage adheres three restrictions: first, it is bou...
Stefan Dziembowski, Sebastian Faust