Sciweavers

731 search results - page 125 / 147
» Special Section on Information and Communication System Secu...
Sort
View
DOCENG
2006
ACM
14 years 2 months ago
Content based SMS spam filtering
In the recent years, we have witnessed a dramatic increment in the volume of spam email. Other related forms of spam are increasingly revealing as a problem of importance, special...
José María Gómez Hidalgo, Gui...
EUROSSC
2008
Springer
13 years 9 months ago
Exploring the Design of Pay-Per-Use Objects in the Construction Domain
Equipment used in the construction domain is often hired in order to reduce cost and maintenance overhead. The cost of hire is dependent on the time period involved and does not ta...
Daniel Fitton, Vasughi Sundramoorthy, Gerd Kortuem...
CHI
2004
ACM
14 years 9 months ago
Pointing without a pointer
We present a method for performing selection tasks based on continuous control of multiple, competing agents who try to determine the user's intentions from their control beh...
John Williamson, Roderick Murray-Smith
KI
1995
Springer
14 years 8 days ago
Integrating Vision and Language: Towards Automatic Description of Human Movements
The integration of vision and natural languageprocessingincreasingly attracts attention in different areas of AI research. Up to now, however, there have only been a few attempts a...
Gerd Herzog, Karl Rohr
P2P
2007
IEEE
110views Communications» more  P2P 2007»
14 years 3 months ago
PISA: P2P Wi-Fi Internet Sharing Architecture
— The demand for cheap broadband Internet for nomadic users has created a market for Internet sharing. WiFi communities which allow their users to share their wired Internet conn...
Tobias Heer, Shaohui Li, Klaus Wehrle