Sciweavers

10396 search results - page 1927 / 2080
» Deployment Support Network
Sort
View
119
Voted
DGO
2007
97views Education» more  DGO 2007»
15 years 3 months ago
Interactive exploration and discovery of e-government services
Government e-services available to citizens represent one of the most frequent and critical points of contact between public administrations and citizens. In addition to common se...
Giovanni Maria Sacco
109
Voted
CSREASAM
2008
15 years 3 months ago
Implementing Cryptography for Packet Level Authentication
Abstract--Packet Level Authentication (PLA) is a novel countermeasure against distributed denial-of-service attacks. Each packet sent across a network has a digital signature and p...
Billy Bob Brumley
LREC
2010
221views Education» more  LREC 2010»
15 years 3 months ago
KALAKA: A TV Broadcast Speech Database for the Evaluation of Language Recognition Systems
A speech database, named KALAKA, was created to support the Albayzin 2008 Evaluation of Language Recognition Systems, organized by the Spanish Network on Speech Technologies from ...
Luis Javier Rodríguez-Fuentes, Mikel Pe&nti...
130
Voted
ECSCW
2007
15 years 3 months ago
Exploring cooperation through a binder: A context for IT tools in elderly care at home
Abstract. This paper examines the empirical findings of a study of the work and cooperation taking place within and between the home help service and home health care in a Swedish ...
Alexandra Petrakou
101
Voted
ICONIP
2008
15 years 3 months ago
An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites
In this paper, we present the performance of machine learning-based methods for detection of phishing sites. We employ 9 machine learning techniques including AdaBoost, Bagging, S...
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobaya...
« Prev « First page 1927 / 2080 Last » Next »