Sciweavers

2399 search results - page 142 / 480
» On Authentication between Human and Computer
Sort
View
141
Voted
HUC
2010
Springer
15 years 5 months ago
Groupthink: usability of secure group association for wireless devices
A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devic...
Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ers...
VLDB
2007
ACM
115views Database» more  VLDB 2007»
16 years 4 months ago
NS2: Networked Searchable Store with Correctness
In an outsourced data framework, we introduce and demonstrate mechanisms for securely storing a set of data items (documents) on an un-trusted server, while allowing for subsequen...
Radu Sion, Sumeet Bajaj, Bogdan Carbunar, Stefan K...
ICPR
2004
IEEE
16 years 5 months ago
Event Semantics in Two-person Interactions
This paper presents a method to represent two-person interactions at a semantic level with a natural language description. A human interaction is composed of two singleperson acti...
Jake K. Aggarwal, Sangho Park
CHI
2005
ACM
16 years 4 months ago
A comparison of LSA, wordNet and PMI-IR for predicting user click behavior
A predictive tool to simulate human visual search behavior would help interface designers inform and validate their design. Such a tool would benefit from a semantic component tha...
Ishwinder Kaur, Anthony J. Hornof
129
Voted
CONEXT
2006
ACM
15 years 10 months ago
Detail characterization of paths in pocket switched networks
Pocket Switched Networking (PSN) is a new communication paradigm between mobile devices. It takes advantage of every local communication opportunity, and the physical mobility of ...
Abderrahmen Mtibaa, Augustin Chaintreau, Christoph...