Sciweavers

13224 search results - page 22 / 2645
» Self-monitoring for Computer Users
Sort
View
TISSEC
2010
237views more  TISSEC 2010»
13 years 2 months ago
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs
Several credential systems have been proposed in which users can authenticate to service providers anonymously. Since anonymity can give users the license to misbehave, some varia...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...
ACMSE
2010
ACM
13 years 5 months ago
Mobile web search personalization using ontological user profile
Most present day search engines have a deterministic behavior in the sense that they return the same search results for all users who submit the same query at a certain time. They...
Kapil Goenka, Ismailcem Budak Arpinar, Mustafa Nur...
ICDE
2009
IEEE
140views Database» more  ICDE 2009»
13 years 5 months ago
Routing Questions to the Right Users in Online Communities
Online forums contain huge amounts of valuable user-generated content. In current forum systems, users have to passively wait for other users to visit the forum systems and read/an...
Yanhong Zhou, Gao Cong, Bin Cui, Christian S. Jens...
GRAPHICSINTERFACE
2011
12 years 11 months ago
AppMap: exploring user interface visualizations
In traditional graphical user interfaces, the majority of UI elements are hidden to the user in the default view. Application designers and users desire more space for their appli...
Michael Rooke, Tovi Grossman, George W. Fitzmauric...
TDSC
2011
13 years 2 months ago
Nymble: Blocking Misbehaving Users in Anonymizing Networks
—Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of...
Patrick P. Tsang, Apu Kapadia, Cory Cornelius, Sea...