Sciweavers

2094 search results - page 315 / 419
» A Bayesian Approach for User Modeling in Dialogue Systems
Sort
View
AINA
2007
IEEE
15 years 11 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
RAID
2010
Springer
15 years 3 months ago
Bait Your Hook: A Novel Detection Technique for Keyloggers
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...
ICMI
2010
Springer
196views Biometrics» more  ICMI 2010»
15 years 2 months ago
Component-based high fidelity interactive prototyping of post-WIMP interactions
In order to support interactive high-fidelity prototyping of postWIMP user interactions, we propose a multi-fidelity design method based on a unifying component-based model and su...
Jean-Yves Lionel Lawson, Mathieu Coterot, Cyril Ca...
SOCIALCOM
2010
15 years 2 months ago
Securing Shareable Life-logs
Sharing life-log information in a social community has many advantages, both for the user and society. But sharing any type of personal information is a threat to privacy. In parti...
Reza Rawassizadeh, A Min Tjoa
WSC
2008
15 years 7 months ago
High performance spreadsheet simulation on a desktop grid
We present a proof-of-concept prototype for high performance spreadsheet simulation called S3. Our goal is to provide a user-friendly, yet computationally powerful simulation envi...
Juta Pichitlamken, Supasit Kajkamhaeng, Putchong U...