Sciweavers

863 search results - page 19 / 173
» Computational Methods for Intelligent Information Access
Sort
View
MSWIM
2006
ACM
15 years 5 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
DOLAP
2006
ACM
15 years 3 months ago
Building a web warehouse for accessibility data
As more and more information is available on the web, it is a problem that many web resources are not accessible, i.e., are not usable for users with special needs. For example, f...
Christian Thomsen, Torben Bach Pedersen
UAIS
2010
14 years 6 months ago
Auditory universal accessibility of data tables using naturally derived prosody specification
Abstract Text documents usually embody visually oriented meta-information in the form of complex visual structures, such as tables. The semantics involved in such objects result in...
Dimitris Spiliotopoulos, Gerasimos Xydas, Georgios...
ATAL
2010
Springer
15 years 29 days ago
Combining statistics and arguments to compute trust
We propose a method for constructing Dempster-Shafer belief functions modeling the trust of a given agent (the evaluator) in another (the target) by combining statistical informat...
Paul-Amaury Matt, Maxime Morge, Francesca Toni
SIGCSE
2008
ACM
104views Education» more  SIGCSE 2008»
14 years 11 months ago
Inspiring blind high school students to pursue computer science with instant messaging chatbots
Blind students are an underrepresented group in computer science. In this paper, we describe our experience preparing and leading the computer science track at the National Federa...
Jeffrey P. Bigham, Maxwell B. Aller, Jeremy T. Bru...