Sciweavers

436 search results - page 53 / 88
» Arguing for gaining access to information
Sort
View
GLOBECOM
2010
IEEE
14 years 12 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
CHI
2009
ACM
16 years 2 months ago
In support of city exploration
CT The novel experience Anywhere allowed participants to explore an urban area, tying together information not normally available, new points of views and interaction embedded into...
Ben Bedwell, Boriana Koleva, Holger Schnädelb...
CHI
2007
ACM
16 years 2 months ago
Pictures at the ATM: exploring the usability of multiple graphical passwords
Users gain access to cash, confidential information and services at Automated Teller Machines (ATMs) via an authentication process involving a Personal Identification Number (PIN)...
Wendy Moncur, Grégory Leplâtre
ICDM
2008
IEEE
113views Data Mining» more  ICDM 2008»
15 years 8 months ago
Text Mining in Radiology Reports
Medical text mining has gained increasing interest in recent years. Radiology reports contain rich information describing radiologist’s observations on the patient’s medical c...
Tianxia Gong, Chew Lim Tan, Tze-Yun Leong, Cheng K...
KDD
2004
ACM
147views Data Mining» more  KDD 2004»
15 years 7 months ago
Semantic representation: search and mining of multimedia content
Semantic understanding of multimedia content is critical in enabling effective access to all forms of digital media data. By making large media repositories searchable, semantic ...
Apostol Natsev, Milind R. Naphade, John R. Smith