Sciweavers

2846 search results - page 486 / 570
» Personalization of a Trust Network
Sort
View
82
Voted
PST
2004
15 years 2 months ago
Determining Internet Users' Values for Private Information
We examine the problem of determining a user's value for his/her private information. Web businesses often offer rewards, such as discounts, free downloads and website persona...
Scott Buffett, Nathan Scott, Bruce Spencer, Michae...
143
Voted
WIS
2004
15 years 2 months ago
AuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...
Christina Braz, Esma Aïmeur
113
Voted
ECIS
2000
15 years 1 months ago
Secure Access to Medical Data over the Internet
The concept of context-dependent access control has emerged during the last years: Information about the state of a process model of a working environment is combined with general ...
Ulrich Ultes-Nitsche, Stephanie Teufel
97
Voted
WSC
1997
15 years 1 months ago
A Performance Monitoring Application for Distributed Interactive Simulations (DIS)
This paper discusses the design, development, and use of a performance monitoring tool for Distributed Interactive Simulations (DIS). A typical DIS environment consists of hundred...
David B. Cavitt, C. Michael Overstreet, Kurt Maly
CISSE
2008
Springer
15 years 1 months ago
Secondary Emotions Deduction from Context
— Human centred services are increasingly common in the market of mobile devices. However, affective aware services are still scarce. In turn, the recognition of secondary emotio...
Kuderna-Iulian Benta, Marcel Cremene, Nicoleta Ram...