Sciweavers

1018 search results - page 85 / 204
» Remote User Authentication Using Public Information
Sort
View
SEMWEB
2009
Springer
14 years 2 months ago
Actively Learning Ontology Matching via User Interaction
Ontology matching plays a key role for semantic interoperability. Many methods have been proposed for automatically finding the alignment between heterogeneous ontologies. However...
Feng Shi, Juanzi Li, Jie Tang, Guo Tong Xie, Hanyu...
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
13 years 6 months ago
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how t...
Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Lu...
SC
2005
ACM
14 years 1 months ago
Identity Boxing: A New Technique for Consistent Global Identity
Today, users of the grid may easily authenticate themselves to computing resources around the world using a public key security infrastructure. However, users are forced to employ...
Douglas Thain
DSN
2007
IEEE
14 years 2 months ago
Automatic Cookie Usage Setting with CookiePicker
HTTP cookies have been widely used for maintaining session states, personalizing, authenticating, and tracking user behaviors. Despite their importance and usefulness, cookies hav...
Chuan Yue, Mengjun Xie, Haining Wang
IADIS
2003
13 years 9 months ago
Web Information Management System: Personalization and Generalization
Our research focuses on web information management for people who want to monitor and use the World Wide Web (WWW) information, as their information resource. Web information is m...
Sung Sik Park, Yang Sok Kim, Byeong Ho Kang