Sciweavers

15379 search results - page 360 / 3076
» Protecting users from
Sort
View
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
16 years 1 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
124
Voted
AIED
2009
Springer
15 years 10 months ago
Identifying strategies in user's exploratory learning behaviour for mathematical generalisation
Abstract. The nature of the activities that take place in Exploratory Learning Environments allow generating a variety of learner trajectories and makes difficult to develop a mod...
Mihaela Cocea, George D. Magoulas
ICC
2008
IEEE
123views Communications» more  ICC 2008»
15 years 10 months ago
Providing End-to-End Connectivity to SIP User Agents Behind NATs
— The widespread diffusion of private networks in SOHO scenarios is fostering an increased deployment of Network Address Translators (NATs). The presence of NATs seriously limits...
Mario Baldi, Luca De Marco, Fulvio Risso, Livio To...
LAWEB
2008
IEEE
15 years 10 months ago
Web Interactivity in the Perspective of Young Users
This paper presents the results of a qualitative research whose objective was to broaden the understanding on the participation of youngsters and adolescents on Internet-based soc...
Caroline Queiroz Santos, Ana Maria Pereira Cardoso
139
Voted
ESWS
2007
Springer
15 years 10 months ago
User-Centric Faceted Search for Semantic Portals
Many semantic portals use faceted browsing, where the facets are based on the underlying indexing ontologies of the content. However, in many cases, like in medical applications, t...
Osma Suominen, Kim Viljanen, Eero Hyvönen