Sciweavers

HUC
2007
Springer
13 years 11 months ago
An Empirical Study of the Potential for Context-Aware Power Management
Context-aware power management (CAPM) uses context (e.g., user location) likely to be available in future ubiquitous computing environments, to effectively power manage a building...
Colin Harris, Vinny Cahill
ESORICS
2007
Springer
13 years 11 months ago
Incorporating Temporal Capabilities in Existing Key Management Schemes
The problem of key management in access hierarchies studies ways to assign keys to users and classes such that each user, after receiving her secret key(s), is able to independentl...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...
ERCIMDL
2007
Springer
85views Education» more  ERCIMDL 2007»
13 years 11 months ago
Supporting Information Management in Digital Libraries with Map-Based Interfaces
—The Self-Organising Map (SOM) has been proposed as an alternative interface for exploring Digital Libraries (DL), in addition to conventional search and browsing. With advanced ...
Rudolf Mayer, Angela Roiger, Andreas Rauber
CIKM
2007
Springer
13 years 11 months ago
"I know what you did last summer": query logs and user privacy
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers ...
Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins
CIARP
2007
Springer
13 years 11 months ago
A Statistical User Simulation Technique for the Improvement of a Spoken Dialog System
Abstract. In this paper, we present a statistical approach for the automatic generation of dialogs by means of a user simulator. This technique can be used to generate dialogs with...
Lluís Hurtado, David Griol, Emilio Sanchis,...
CEAS
2007
Springer
13 years 11 months ago
TV-ACTA: Embedding an Activity-Centered Interface for Task Management in Email
In contextual computing, where cues beyond direct user input are used to trigger computation, one of the most daunting challenges is inferring what the user is doing. For the doma...
Victoria Bellotti, Jim Thornton, Alvin Chin, Diane...
CCS
2007
ACM
13 years 11 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
ADAPTIVE
2007
Springer
13 years 11 months ago
Generic User Modeling Systems
The paper reviews the development of generic user modeling systems over the past twenty years. It describes their purposes, their services within user-adaptive systems, and the dif...
Alfred Kobsa
IV
2007
IEEE
136views Visualization» more  IV 2007»
13 years 11 months ago
Dynamic Text Filtering for Improving the Usability of Alphasliders on Small Screens
Previous research has shown that Alphasliders are an effective tool for searching an alphabetically sorted list when only limited screen space is available for the graphical user ...
Thorsten Büring, Jens Gerken, Harald Reiterer
ICC
2007
IEEE
141views Communications» more  ICC 2007»
13 years 11 months ago
A Decomposition-Based Low-Complexity Scheduling Scheme for Power Minimization under Delay Constraints in Time-Varying Uplink Cha
Abstract— In this paper, we investigate the problem of minimizing the average transmission power of users while guaranteeing the average delay constraints in time-varying uplink ...
Hojoong Kwon, Byeong Gi Lee