Sciweavers

1573 search results - page 313 / 315
» Strong User Authentication
Sort
View
IEEECIT
2010
IEEE
13 years 5 months ago
The Curriculum Reform of Database System Principle Based on Paperless Examination Platform
—Database technology is the significant part of computer science and technology, as the core technology of information management, database technology is widely used in the field...
Haifeng Ke, Gaoyan Zhang, Minghui Wu
IFIPTM
2010
113views Management» more  IFIPTM 2010»
13 years 5 months ago
Impact of Trust Management and Information Sharing to Adversarial Cost in Ranking Systems
Ranking systems such as those in product review sites and recommender systems usually use ratings to rank favorite items based on both their quality and popularity. Since higher ra...
Le-Hung Vu, Thanasis G. Papaioannou, Karl Aberer
ICNC
2010
Springer
13 years 5 months ago
Emotional talking agent: System and evaluation
In this paper, we introduce a system that synthesizes the emotional audio-visual speech for a 3-D talking agent by adopting the PAD (Pleasure-Arousal-Dominance) emotional model. A ...
Shen Zhang, Jia Jia, Yingjin Xu, Lianhong Cai
IEEEARES
2010
IEEE
13 years 5 months ago
Using Smart Cards for Tamper-Proof Timestamps on Untrusted Clients
Online auctions of governmental bonds and CO2 certificates are challenged by high availability requirements in face of high peak loads around the auction deadline. Traditionally, t...
Guenther Starnberger, Lorenz Froihofer, Karl M. G&...
WISE
2010
Springer
13 years 5 months ago
Neighborhood-Restricted Mining and Weighted Application of Association Rules for Recommenders
Abstract. Association rule mining algorithms such as Apriori were originally developed to automatically detect patterns in sales transactions and were later on also successfully ap...
Fatih Gedikli, Dietmar Jannach