Sciweavers

829 search results - page 92 / 166
» Adverse selection in online
Sort
View
WWW
2004
ACM
16 years 17 days ago
A semantic matchmaker service on the grid
A fundamental task on the Grid is to decide what jobs to run on what computing resources based on job or application requirements. Our previous work on ontology-based matchmaking ...
Andreas Harth, Stefan Decker, Yu He, Hongsuda Tang...
79
Voted
CHI
2008
ACM
16 years 9 days ago
Memorability of persuasive passwords
Text passwords are the primary authentication method used for most online services. Many online users select weak passwords. Regrettably, most proposed methods of strengthening pa...
Alain Forget, Robert Biddle
ECIR
2009
Springer
15 years 9 months ago
Multi-facet Rating of Product Reviews
Online product reviews are becoming increasingly available, and are being used more and more frequently by consumers in order to choose among competing products. Tools that rank co...
Stefano Baccianella, Andrea Esuli, Fabrizio Sebast...
ICPR
2008
IEEE
15 years 6 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
ARITH
2005
IEEE
15 years 5 months ago
A Linear-System Operator Based Scheme for Evaluation of Multinomials
We present a radix-2 online computational scheme for evaluating multinomials in a fixed-point number representation system. Its main advantage is that it can adapt to any evaluat...
Pavan Adharapurapu, Milos D. Ercegovac