Sciweavers

479 search results - page 16 / 96
» Putting personas to work
Sort
View
ICC
2009
IEEE
122views Communications» more  ICC 2009»
14 years 2 months ago
Sensitive Data Requests: Do Sites Ask Correctly?
— To ensure the security of sensitive Web content, an organization must use TLS and do so correctly. However, little is known about how TLS is actually used on the Web. In this w...
Craig A. Shue, Minaxi Gupta
DEXAW
2007
IEEE
160views Database» more  DEXAW 2007»
14 years 1 months ago
Apolda: A Practical Tool for Semantic Annotation
In this paper we give an overview of methods to find representations of ontology defined concepts in texts. We distinguish two approaches: lexicon-based methods and approaches u...
Christian Wartena, Rogier Brussee, Luit Gazendam, ...
ICMCS
2006
IEEE
148views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Controlled Complexity Map Decoding of CABAC Encoded Data
In this paper, we present a joint source-channel decoding technique based on exact MAP estimation for data encoded by CABAC (Context-based Adaptive Binary Arithmetic Coding) in st...
Salma Ben Jamaa, Michel Kieffer, Pierre Duhamel
AIED
2005
Springer
14 years 1 months ago
Developing Teaching Aids for Distance Education
As web-enhanced courses become more successful, they put considerable burdens on instructors and teaching assistants. We present our work on developing software tools to support in...
Jihie Kim, Carole Beal, Zeeshan Maqbool
ISI
2005
Springer
14 years 1 months ago
Data Distortion for Privacy Protection in a Terrorist Analysis System
Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data miningbased terrorist analysis systems. We propose a spars...
Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang