Sciweavers

1363 search results - page 194 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
IDEAL
2010
Springer
15 years 1 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
PKDD
2010
Springer
169views Data Mining» more  PKDD 2010»
15 years 1 months ago
Efficient and Numerically Stable Sparse Learning
We consider the problem of numerical stability and model density growth when training a sparse linear model from massive data. We focus on scalable algorithms that optimize certain...
Sihong Xie, Wei Fan, Olivier Verscheure, Jiangtao ...
ACMIDC
2009
15 years 1 months ago
Developing a media space for remote synchronous parent-child interaction
While supporting family communication has traditionally been a domain of interest for interaction designers, few research initiatives have explicitly investigated remote synchrono...
Svetlana Yarosh, Stephen Cuzzort, Hendrik Mül...
DEBU
2010
127views more  DEBU 2010»
15 years 22 days ago
Provenance in ORCHESTRA
Sharing structured data today requires agreeing on a standard schema, then mapping and cleaning all of the data to achieve a single queriable mediated instance. However, for setti...
Todd J. Green, Grigoris Karvounarakis, Zachary G. ...
CSCW
2011
ACM
14 years 10 months ago
It's about time: confronting latency in the development of groupware systems
The presence of network latency leads to usability problems in distributed groupware applications. Example problems include difficulty synchronizing tightly-coupled collaboration...
Cheryl Savery, T. C. Nicholas Graham