Sciweavers

395 search results - page 50 / 79
» When do we interact multimodally
Sort
View
DBSEC
2010
129views Database» more  DBSEC 2010»
13 years 10 months ago
Secure Outsourcing of DNA Searching via Finite Automata
This work treats the problem of error-resilient DNA searching via oblivious evaluation of finite automata, formulated as follows: a client has a DNA sequence, and a service provid...
Marina Blanton, Mehrdad Aliasgari
ICWSM
2008
13 years 10 months ago
Spontaneous Inference of Personality Traits and Effects on Memory for Online Profiles
As users navigate online social spaces, they encounter numerous personal profiles, each displaying a unique constellation of attributes. How do users make sense of this informatio...
Kristin Brooke Stecher, Scott Counts
JNW
2008
128views more  JNW 2008»
13 years 8 months ago
A Proxy-Based Approach to Enhancing the Autonomic Behavior in Composite Services
Web services paradigm is allowing applications to electronically interact with one another over the Internet. The business process execution language (BPEL) takes this ion to a hig...
Onyeka Ezenwoye, Seyed Masoud Sadjadi
PERVASIVE
2007
Springer
14 years 2 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen
ATAL
2011
Springer
12 years 8 months ago
ESCAPES: evacuation simulation with children, authorities, parents, emotions, and social comparison
In creating an evacuation simulation for training and planning, realistic agents that reproduce known phenomenon are required. Evacuation simulation in the airport domain requires...
Jason Tsai, Natalie Fridman, Emma Bowring, Matthew...