Sciweavers

7607 search results - page 1387 / 1522
» informs 2006
Sort
View
172
Voted
W4A
2006
ACM
15 years 9 months ago
Contextual web accessibility - maximizing the benefit of accessibility guidelines
We argue that while work to optimize the accessibility of the World Wide Web through the publication and dissemination of a range of guidelines is of great importance, there is al...
David Sloan, Andy Heath, Fraser Hamilton, Brian Ke...
133
Voted
APNOMS
2006
Springer
15 years 7 months ago
Signature-Aware Traffic Monitoring with IPFIX
Traffic monitoring is essential for accounting user traffic and detecting anomaly traffic such as Internet worms or P2P file sharing applications. Since typical Internet traffic mo...
Youngseok Lee, Seongho Shin, Taeck-Geun Kwon
130
Voted
ASIACRYPT
2006
Springer
15 years 7 months ago
Secure Sketch for Biometric Templates
There have been active discussions on how to derive a consistent cryptographic key from noisy data such as biometric templates, with the help of some extra information called a ske...
Qiming Li, Yagiz Sutcu, Nasir D. Memon
107
Voted
ATAL
2006
Springer
15 years 7 months ago
Deploying a personalized time management agent
We report on our ongoing practical experience in designing, implementing, and deploying PTIME, a personalized agent for time management and meeting scheduling in an open, multi-ag...
Pauline Berry, Bart Peintner, Ken Conley, Melinda ...
ATC
2006
Springer
15 years 7 months ago
Ubisafe Computing: Vision and Challenges (I)
In recent years, a variety of new computing paradigms have been proposed for various purposes. It is true that many of them intend to and really can gratify some of the people some...
Jianhua Ma, Qiangfu Zhao, Vipin Chaudhary, Jingde ...
« Prev « First page 1387 / 1522 Last » Next »