Sciweavers

130 search results - page 14 / 26
» User Authentication through Typing Biometrics Features
Sort
View
PKDD
2004
Springer
205views Data Mining» more  PKDD 2004»
14 years 25 days ago
Breaking Through the Syntax Barrier: Searching with Entities and Relations
The next wave in search technology will be driven by the identification, extraction, and exploitation of real-world entities represented in unstructured textual sources. Search sy...
Soumen Chakrabarti
ACHI
2009
IEEE
14 years 2 months ago
Knowledge Reuse through Categorical Breakdown Analysis: A Method for Collaborative Systems Evaluation
Designing CSCW systems that support the widely varying needs of targeted users is difficult. There is no silver bullet technology that enables users to effectively collaborate wit...
Will Humphries, D. Scott McCrickard, Dennis C. Nea...
HICSS
2007
IEEE
164views Biometrics» more  HICSS 2007»
14 years 1 months ago
The Social Structure of Tagging Internet Video on del.icio.us
Abstract— The ability to tag resources with uncontrolled metadata or “folksonomies” is often characterized as one of the central features of “Web 2.0” applications. Folks...
John C. Paolillo, Shashikant Penumarthy
ICIP
1998
IEEE
14 years 9 months ago
A Web-based Secure System for the Distributed Printing of Documents and Images
We propose and consider a secure printing system for the distributed printing of documents and images over the World Wide Web. This system enables secure sharing, commerce, and co...
Ping Wah Wong, Daniel Tretter, Thomas Kite, Qian L...
ICWSM
2009
13 years 5 months ago
Targeting Sentiment Expressions through Supervised Ranking of Linguistic Configurations
User generated content is extremely valuable for mining market intelligence because it is unsolicited. We study the problem of analyzing users' sentiment and opinion in their...
Jason S. Kessler, Nicolas Nicolov