Sciweavers

1625 search results - page 269 / 325
» Intentionality
Sort
View
GLOBECOM
2009
IEEE
15 years 1 months ago
Secure Unified Cellular Ad Hoc Network Routing
Abstract--Previous simulations have shown substantial performance gains can be achieved by using hybrid cellular and wireless LAN (WLAN) approaches [1]. In a hybrid system, a proxy...
Jason J. Haas, Yih-Chun Hu
148
Voted
HCI
2009
15 years 1 months ago
People-Oriented Programming: From Agent-Oriented Analysis to the Design of Interactive Systems
Where the Object-Oriented paradigm set about abstracting objects, iented (AO) theory draws on Psychology to abstract mentalist notions like: beliefs, perceptions, goals, and intent...
Steve Goschnick
136
Voted
ICDAR
2009
IEEE
15 years 1 months ago
ICDAR 2009 Signature Verification Competition
Recent results of forgery detection by implementing biometric signature verification methods are promising. At present, forensic signature verification in daily casework is perfor...
Vivian L. Blankers, C. Elisa van den Heuvel, Katri...
145
Voted
IJSSE
2010
121views more  IJSSE 2010»
15 years 23 days ago
Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attacks
This paper presents an approach for retrofitting existing web applications with runtime protection against known as well as unseen SQL injection attacks (SQLIAs) without the invol...
San-Tsai Sun, Konstantin Beznosov
152
Voted
CSCW
2011
ACM
14 years 10 months ago
Three sequential positions of query repair in interactions with internet search engines
Internet search engines display understanding or misunderstanding of user intent in and through the particular batches of results they retrieve and their perceived relevance. Yet ...
Robert J. Moore, Elizabeth F. Churchill, Raj Gopal...