Sciweavers

1029 search results - page 169 / 206
» Improving User Satisfaction in a Ubiquitous Computing Applic...
Sort
View
106
Voted
CCS
2009
ACM
15 years 5 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
CVPR
2005
IEEE
16 years 2 months ago
Multi-Output Regularized Projection
Dimensionality reduction via feature projection has been widely used in pattern recognition and machine learning. It is often beneficial to derive the projections not only based o...
Kai Yu, Shipeng Yu, Volker Tresp
104
Voted
ADHOCNETS
2009
Springer
15 years 7 months ago
Cooperative Localization in GPS-Limited Urban Environments
Abstract. Existing localization techniques such as GPS have fundamental limitations which preclude deployment in urban canyons or areas with inconsistent network availability. Augm...
Jeffrey Hemmes, Douglas Thain, Christian Poellabau...
88
Voted
AGILE
2007
Springer
127views GIS» more  AGILE 2007»
15 years 6 months ago
Space-contained conflict revision, for geographic information
Using qualitative reasoning with geographic information, contrarily, for instance, with robotics, looks not only fastidious (i.e.: encoding knowledge Propositional Logics PL), but ...
Omar Doukari, Robert Jeansoulin
81
Voted
ICCSA
2010
Springer
15 years 5 months ago
ISATEM: An Integration of Socioeconomic and Spatial Models for Mineral Resources Exploitation
In the spatial-integrated socioeconomic model field, a multi-agent approach is appropriate for supporting applications modelled at a detailed territory scale, but it is less used t...
Fenintsoa Andriamasinoro, Daniel Cassard, Bruno Ma...