Sciweavers

3149 search results - page 173 / 630
» Users in Context
Sort
View
120
Voted
BIRTHDAY
2009
Springer
15 years 10 months ago
Web Service Composition via the Customization of Golog Programs with User Preferences
Abstract. We claim that user preferences are a key component of effective Web service composition, and one that has largely been ignored. In this paper we propose a means of speci...
Shirin Sohrabi, Nataliya Prokoshyna, Sheila A. McI...
140
Voted
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 10 months ago
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior
Abstract. “Secure Device Pairing” is the process of bootstrapping secure communication between two devices over a short- or medium-range wireless channel (such as Bluetooth, Wi...
Nitesh Saxena, Md. Borhan Uddin
SOSP
2003
ACM
16 years 19 days ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...
135
Voted
IUI
2010
ACM
15 years 10 months ago
From documents to tasks: deriving user tasks from document usage patterns
A typical knowledge worker is involved in multiple tasks and switches frequently between them every work day. These frequent switches become expensive because each task switch req...
Oliver Brdiczka
129
Voted
PERVASIVE
2010
Springer
15 years 10 months ago
On the Use of Brain Decoded Signals for Online User Adaptive Gesture Recognition Systems
Activity and context recognition in pervasive and wearable computing ought to continuously adapt to changes typical of open-ended scenarios, such as changing users, sensor characte...
Kilian Förster, Andrea Biasiucci, Ricardo Cha...