Sciweavers

25112 search results - page 58 / 5023
» Data, Information, and Knowledge
Sort
View
ICISS
2007
Springer
15 years 1 months ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...
ICIS
2000
14 years 11 months ago
Personalization of search engine services for effective retrieval and knowledge management
The Internet and corporate intranets provide far more information than anybody can absorb. People use search engines to find the information they require. However, these systems t...
Weiguo Fan, Michael D. Gordon, Praveen Pathak
VIS
2007
IEEE
192views Visualization» more  VIS 2007»
15 years 11 months ago
LiveSync: Deformed Viewing Spheres for Knowledge-Based Navigation
Although real-time interactive volume rendering is available even for very large data sets, this visualization method is used quite rarely in the clinical practice. We suspect this...
Peter Kohlmann, Stefan Bruckner, Armin Kanitsar,...
COMPSAC
2005
IEEE
15 years 23 hour ago
A Novel Method for Protecting Sensitive Knowledge in Association Rules Mining
Discovering frequent patterns from huge amounts of data is one of the most studied problems in data mining. However, some sensitive patterns with security policies may cause a thr...
En Tzu Wang, Guanling Lee, Yu Tzu Lin
IBPRIA
2007
Springer
14 years 12 months ago
Automatic Learning of Conceptual Knowledge in Image Sequences for Human Behavior Interpretation
This work describes an approach for the interpretation and explanation of human behavior in image sequences, within the context of a Cognitive Vision System. The information source...
Pau Baiget, Carles Fernández Tena, F. Xavie...