Sciweavers

216 search results - page 38 / 44
» Revealing Web User Requirements through e-Prototyping
Sort
View
SIGMOD
2008
ACM
150views Database» more  SIGMOD 2008»
14 years 7 months ago
Query biased snippet generation in XML search
Snippets are used by almost every text search engine to complement ranking scheme in order to effectively handle user searches, which are inherently ambiguous and whose relevance ...
Yu Huang, Ziyang Liu, Yi Chen
VTC
2007
IEEE
132views Communications» more  VTC 2007»
14 years 1 months ago
Collaborative Information Revelation and Collusion in "Word-of-Mouth" Access Selection Schemes
— “Word-of-Mouth”, a novel scheme for sharing the service quality experienced with different local networks, is presented and evaluated as a distributed solution for performi...
Pietro Lungaro
SP
2006
IEEE
100views Security Privacy» more  SP 2006»
14 years 1 months ago
Fundamental Limits on the Anonymity Provided by the MIX Technique
The MIX technique forms the basis of many popular services that offer anonymity of communication in open and shared networks such as the Internet. In this paper, fundamental limit...
Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Di...
UM
2001
Springer
13 years 11 months ago
Recognizing Time Pressure and Cognitive Load on the Basis of Speech: An Experimental Study
In an experimental environment, we simulated the situation of a user who gives speech input to a system while walking through an airport. The time pressure on the subjects and the ...
Christian A. Müller, Barbara Großmann-H...
KDD
2006
ACM
253views Data Mining» more  KDD 2006»
14 years 7 months ago
Adaptive Website Design Using Caching Algorithms
Visitors enter a website through a variety of means, including web searches, links from other sites, and personal bookmarks. In some cases the first page loaded satisfies the visi...
Justin Brickell, Inderjit S. Dhillon, Dharmendra S...