Sciweavers

6768 search results - page 1104 / 1354
» Developing Applications Using Model-Driven Design Environmen...
Sort
View
ECRIME
2007
15 years 8 months ago
Fishing for phishes: applying capture-recapture methods to estimate phishing populations
We estimate of the extent of phishing activity on the Internet via capture-recapture analysis of two major phishing site reports. Capture-recapture analysis is a population estima...
Rhiannon Weaver, M. Patrick Collins
COOPIS
2004
IEEE
15 years 8 months ago
Service Graphs for Building Trust
Information systems must establish trust to cooperate effectively in open environments. We are developing an agent-based approach for establishing trust, where information systems ...
Pinar Yolum, Munindar P. Singh
ASSETS
2008
ACM
15 years 6 months ago
Computer vision-based clear path guidance for blind wheelchair users
We describe a system for guiding blind and visually impaired wheelchair users along a clear path that uses computer vision to sense the presence of obstacles or other terrain feat...
Volodymyr Ivanchenko, James Coughlan, William Gerr...
CCS
2008
ACM
15 years 6 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
ADAPTIVE
2007
Springer
15 years 6 months ago
Personalized Search on the World Wide Web
With the exponential growth of the available information on the World Wide Web, a traditional search engine, even if based on sophisticated document indexing algorithms, has diffi...
Alessandro Micarelli, Fabio Gasparetti, Filippo Sc...
« Prev « First page 1104 / 1354 Last » Next »