Sciweavers

1018 search results - page 184 / 204
» Remote User Authentication Using Public Information
Sort
View
JSW
2007
185views more  JSW 2007»
13 years 7 months ago
A Decision Support System base line Flexible Architecture to Intrusion Detection
—Becoming more competitive and more effective in the current scenes of Business and Public Administration, the organizations must be able to approach easily and quickly to the in...
Marcello Castellano, Giuseppe Mastronardi, Angela ...
PUC
2010
138views more  PUC 2010»
13 years 2 months ago
Design and implementation of a VoiceXML-driven wiki application for assistive environments on the web
In this paper, we describe the design and implementation of an audio wiki application accessible via both the Public Switched Telephone Network and the Internet. The application ex...
Constantinos Kolias, Vassilis Kolias, Ioannis Anag...
DILS
2005
Springer
14 years 1 months ago
BioNavigation: Selecting Optimum Paths Through Biological Resources to Evaluate Ontological Navigational Queries
Publicly available biological resources form a complex maze of highly heterogeneous data sources, interconnected by navigational capabilities and applications. Although it offers ...
Zoé Lacroix, Kaushal Parekh, Maria-Esther V...
AAAI
2006
13 years 9 months ago
Monitoring Food Safety by Detecting Patterns in Consumer Complaints
EPFC (Emerging Patterns in Food Complaints) is the analytical component of the Consumer Complaint Monitoring System, designed to help the food safety officials to efficiently and ...
Artur Dubrawski, Kimberly Elenberg, Andrew W. Moor...
TKDE
2010
224views more  TKDE 2010»
13 years 2 months ago
Non-Negative Matrix Factorization for Semisupervised Heterogeneous Data Coclustering
Coclustering heterogeneous data has attracted extensive attention recently due to its high impact on various important applications, such us text mining, image retrieval, and bioin...
Yanhua Chen, Lijun Wang, Ming Dong