Sciweavers

15379 search results - page 380 / 3076
» Protecting users from
Sort
View
ITCC
2000
IEEE
15 years 8 months ago
Towards Knowledge Discovery from WWW Log Data
As the result of interactions between visitors and a web site, an http log file contains very rich knowledge about users on-site behaviors, which, if fully exploited, can better c...
Feng Tao, Fionn Murtagh
CSREASAM
2006
15 years 5 months ago
Mechanism-Based PKI - A Real-Time Key Generation from Fingerprints
- This paper proposes a "mechanism-based PKI", in which only a mechanism for generating user's private keys is installed on a smart card. The private key is generate...
Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, ...
ICASSP
2010
IEEE
15 years 4 months ago
Collaborative spectrum sensing from sparse observations using matrix completion for cognitive radio networks
— In cognitive radio, spectrum sensing is a key component to detect spectrum holes (i.e., channels not used by any primary users). Collaborative spectrum sensing among the cognit...
Jia Meng, Wotao Yin, Husheng Li, Ekram Hossain, Zh...
177
Voted
ACMSE
2010
ACM
15 years 2 months ago
Dissemination and presentation of high resolution air pollution data from mobile sensor nodes
This paper presents the framework of a mobile air quality monitoring network, with an in-depth discussion of several new innovative techniques for web-based visualization. These t...
Will Hedgecock, Péter Völgyesi, &Aacut...
225
Voted
ECSCW
2011
14 years 3 months ago
Digital Traces of Interest: Deriving Interest Relationships from Social Media Interactions
Facebook and Twitter have changed the way we consume information, allowing the people we follow to become our “social filters” and determine the content of our information stre...
Michal Jacovi, Ido Guy, Inbal Ronen, Adam Perer, E...