Sciweavers

1018 search results - page 137 / 204
» Remote User Authentication Using Public Information
Sort
View
DBSEC
2010
319views Database» more  DBSEC 2010»
13 years 9 months ago
Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach
As online social networking sites become more and more popular, they have also attracted the attentions of the spammers. In this paper, Twitter, a popular micro-blogging service, i...
Alex Hai Wang
CRIWG
2008
13 years 9 months ago
Comparing Usage Performance on Mobile Applications
This paper presents an analysis tool for comparative and collaborative evaluation of mobile artefact usage. Three scenarios were envisioned for the comparative dimension covering b...
Luís Carriço, Luís Duarte, An...
CSCW
2010
ACM
14 years 4 months ago
Are you having difficulty?
It would be useful if software engineers/instructors could be aware that remote team members/students are having difficulty with their programming tasks. We have developed an appr...
Jason Carter, Prasun Dewan
ICISS
2007
Springer
13 years 11 months ago
Performance Analysis for Multi Sensor Fingerprint Recognition System
The increasing use of distributed authentication architecture has made interoperability of systems an important issue. Interoperability of systems reflects the maturity of the tech...
Shimon K. Modi, Stephen J. Elliott, Hakil Kim
ERCIMDL
2007
Springer
115views Education» more  ERCIMDL 2007»
14 years 2 months ago
The Semantic GrowBag Algorithm: Automatically Deriving Categorization Systems
Using keyword search to find relevant objects in digital libraries often results in way too large result sets. Based on the metadata associated with such objects, the faceted sear...
Jörg Diederich, Wolf-Tilo Balke