Sciweavers

1102 search results - page 113 / 221
» Interactive Refinement of a Knowledge Base
Sort
View
JCS
2011
126views more  JCS 2011»
14 years 10 months ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
L. H. Nguyen, A. W. Roscoe
MABS
2004
Springer
15 years 8 months ago
Formal Analysis of Meeting Protocols
Organizations depend on regular meetings to carry out their everyday tasks. When carried out successfully, meetings offer a common medium for participants to exchange ideas and mak...
Catholijn M. Jonker, Martijn C. Schut, Jan Treur, ...
CHI
2009
ACM
16 years 3 months ago
The angle mouse: target-agnostic dynamic gain adjustment based on angular deviation
We present a novel method of dynamic C-D gain adaptation that improves target acquisition for users with motor impairments. Our method, called the Angle Mouse, adjusts the mouse C...
Jacob O. Wobbrock, James Fogarty, Shih-Yen (Sean) ...
MLMI
2007
Springer
15 years 9 months ago
Conditional Sequence Model for Context-Based Recognition of Gaze Aversion
Eye gaze and gesture form key conversational grounding cues that are used extensively in face-to-face interaction among people. To accurately recognize visual feedback during inter...
Louis-Philippe Morency, Trevor Darrell
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
15 years 8 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes