Sciweavers

1191 search results - page 175 / 239
» Online Games and Security
Sort
View
ESORICS
2009
Springer
15 years 7 months ago
A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem
Abstract. Biometric information is regarded as highly sensitive information and therefore encryption techniques for biometric information are needed to address security and privacy...
Ileana Buhan, Jeroen Breebaart, Jorge Guajardo, Ko...
114
Voted
KDD
2009
ACM
190views Data Mining» more  KDD 2009»
16 years 1 months ago
Named entity mining from click-through data using weakly supervised latent dirichlet allocation
This paper addresses Named Entity Mining (NEM), in which we mine knowledge about named entities such as movies, games, and books from a huge amount of data. NEM is potentially use...
Gu Xu, Shuang-Hong Yang, Hang Li
101
Voted
CHI
2007
ACM
16 years 1 months ago
Trust 2.1: advancing the trust debate
Trust has a considerable research tradition in the CHI community. It has been investigated in the context of e-commerce, virtual teams, online gaming, social networking ? to name ...
Jens Riegelsberger, Asimina Vasalou
CHI
2006
ACM
16 years 1 months ago
Insert movie reference here: a system to bridge conversation and item-oriented web sites
Item-oriented Web sites maintain repositories of information about things such as books, games, or products. Many of these Web sites offer discussion forums. However, these forums...
Sara Drenner, F. Maxwell Harper, Dan Frankowski, J...
113
Voted
CHI
2005
ACM
16 years 1 months ago
PINS push in and POUTS pop out: creating a tangible pin-board that ejects physical documents
There is an asymmetry in many tangible interfaces: while phicons can be used to manipulate digital information, the reverse is often not possible ? the digital world cannot push b...
Kher Hui Ng, Steve Benford, Boriana Koleva