Sciweavers

2795 search results - page 343 / 559
» Recommended or Not
Sort
View
IJSWIS
2006
168views more  IJSWIS 2006»
13 years 10 months ago
Unraveling the Taste Fabric of Social Networks
Popular online social networks such as Friendster and MySpace do more than simply reveal the superficial structure of social connectedness--the rich meanings bottled within social...
Hugo Liu, Pattie Maes, Glorianna Davenport
JACM
2006
93views more  JACM 2006»
13 years 10 months ago
Combining expert advice in reactive environments
"Experts algorithms" constitute a methodology for choosing actions repeatedly, when the rewards depend both on the choice of action and on the unknown current state of t...
Daniela Pucci de Farias, Nimrod Megiddo
INTR
2007
98views more  INTR 2007»
13 years 10 months ago
User-centered evaluation of information: a research challenge
Purpose – This paper sets out to present the concept of the value of information, review the descriptive, rational, social and behavioral approaches for assessing the value of i...
Daphne R. Raban
JCM
2007
101views more  JCM 2007»
13 years 10 months ago
Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond
Abstract— New applications for Radio Frequency Identification (RFID) technology include embedding transponders in everyday things used by individuals, such as library books, pay...
Marci Meingast, Jennifer King, Deirdre K. Mulligan
COMPSEC
2004
131views more  COMPSEC 2004»
13 years 10 months ago
Biometric random number generators
Abstract Up to now biometric methods have been used in cryptography for authentication purposes. In this paper we propose to use biological data for generating sequences of random ...
Janusz Szczepanski, Elek Wajnryb, José M. A...