Sciweavers

120 search results - page 5 / 24
» Implicit Authentication through Learning User Behavior
Sort
View
ICARCV
2006
IEEE
230views Robotics» more  ICARCV 2006»
15 years 3 months ago
A Biometric Approach to Linux Login Access Control
— Login access control refers to securing the entry point to a computing system. The login system is responsible for this service and must provide a number of tasks, the main tas...
Adam J. Gandossi, Wanquan Liu, Ronny Tjahyadi
JCDL
2010
ACM
161views Education» more  JCDL 2010»
14 years 7 months ago
Search behaviors in different task types
Personalization of information retrieval tailors search towards individual users to meet their particular information needs by taking into account information about users and thei...
Jingjing Liu, Michael J. Cole, Chang Liu, Ralf Bie...
AUSAI
2007
Springer
15 years 1 months ago
Elements of a Learning Interface for Genre Qualified Search
Even prior to content, the genre of a web document leads to a first coarse binary classification of the recall space in relevant and non-relevant documents. Thinking of a genre se...
Andrea Stubbe, Christoph Ringlstetter, Randy Goebe...
87
Voted
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 4 months ago
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior
Abstract. “Secure Device Pairing” is the process of bootstrapping secure communication between two devices over a short- or medium-range wireless channel (such as Bluetooth, Wi...
Nitesh Saxena, Md. Borhan Uddin
ATAL
2005
Springer
15 years 3 months ago
Implicit: an agent-based recommendation system for web search
The number of web pages available on Internet increases day after day, and consequently finding relevant information becomes more and more a hard task. However, when we consider ...
Aliaksandr Birukou, Enrico Blanzieri, Paolo Giorgi...