Sciweavers

863 search results - page 57 / 173
» Computational Methods for Intelligent Information Access
Sort
View
IDEAL
2010
Springer
14 years 9 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
SAINT
2007
IEEE
15 years 6 months ago
Privacy-Aware Context Discovery for Next Generation Mobile Services
We present a system that enables applications to discover and obtain information that describes the context of a particular entity (e.g., a user or a device). Our system revolves ...
Cristian Hesselman, Henk Eertink, Martin Wibbels
ACIVS
2006
Springer
15 years 3 months ago
Context-Based Scene Recognition Using Bayesian Networks with Scale-Invariant Feature Transform
Scene understanding is an important problem in intelligent robotics. Since visual information is uncertain due to several reasons, we need a novel method that has robustness to the...
Seung-Bin Im, Sung-Bae Cho
SACMAT
2003
ACM
15 years 5 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
KR
2004
Springer
15 years 5 months ago
GlossOnt: A Concept-focused Ontology Building Tool
The demand for ontologies is rapidly growing especially due to developments in knowledge management, E-commerce and the Semantic Web. Building an ontology and a background knowled...
Youngja Park