Sciweavers

2257 search results - page 77 / 452
» Information accountability
Sort
View
SOUPS
2006
ACM
15 years 5 months ago
Passpet: convenient password management and phishing protection
We describe Passpet, a tool that improves both the convenience and security of website logins through a combination of techniques. Password hashing helps users manage multiple acc...
Ka-Ping Yee, Kragen Sitaker
ITRUST
2005
Springer
15 years 5 months ago
A Probabilistic Trust Model for Handling Inaccurate Reputation Sources
Abstract. This research aims to develop a model of trust and reputation that will ensure good interactions amongst software agents in large scale open systems in particular. The fo...
Jigar Patel, W. T. Luke Teacy, Nicholas R. Jenning...
ECIR
2007
Springer
15 years 1 months ago
Automatic Morphological Query Expansion Using Analogy-Based Machine Learning
Information retrieval systems (IRSs) usually suffer from a low ability to recognize a same idea that is expressed in different forms. A way of improving these systems is to take ...
Fabienne Moreau, Vincent Claveau, Pascale Sé...
BVAI
2007
Springer
15 years 6 months ago
The Bayesian Draughtsman: A Model for Visuomotor Coordination in Drawing
Abstract. In this article we present a model of realistic drawing accounting for visuomotor coordination, namely the strategies adopted to coordinate the processes of eye and hand ...
Ruben Coen Cagli, Paolo Coraggio, Paolo Napoletano...
CNSM
2010
14 years 10 months ago
CRAC: Confidentiality risk assessment and IT-infrastructure comparison
Confidentiality is a critical aspect in todays Risk Assessment (RA) practices for many industrial organizations. Assessing confidentiality risks is challenging and the result of a ...
Ayse Morali, Emmanuele Zambon, Sandro Etalle, Roel...