Sciweavers

62 search results - page 6 / 13
» User Modeling for Telecommunication Applications: Experience...
Sort
View
JCS
2010
135views more  JCS 2010»
13 years 6 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
IUI
2003
ACM
14 years 26 days ago
A model of textual affect sensing using real-world knowledge
This paper presents a novel way for assessing the affective qualities of natural language and a scenario for its use. Previous approaches to textual affect sensing have employed k...
Hugo Liu, Henry Lieberman, Ted Selker
WWW
2008
ACM
14 years 8 months ago
SMash: secure component model for cross-domain mashups on unmodified browsers
Mashup applications mix and merge content (data and code) from multiple content providers in a user's browser, to provide high-value web applications that can rival the user ...
Frederik De Keukelaere, Sumeer Bhola, Michael Stei...
ER
2006
Springer
137views Database» more  ER 2006»
13 years 11 months ago
Preference Functional Dependencies for Managing Choices
Abstract. The notion of user preference in database modeling has recently received much attention in advanced applications, such as personalization of e-services, since it captures...
Wilfred Ng
GLOBECOM
2007
IEEE
14 years 1 months ago
Mobility-Assisted Sensor Networking for Field Coverage
—In many sensor network applications, manual or well-controlled node deployment is not practical. Random deployments, e.g., from the air, often result in unevenly distributed nod...
Dan Wang, Jiangchuan Liu, Qian Zhang