Sciweavers

2846 search results - page 491 / 570
» Personalization of a Trust Network
Sort
View
110
Voted
ESORICS
2010
Springer
14 years 10 months ago
Speaker Recognition in Encrypted Voice Streams
Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additi...
Michael Backes, Goran Doychev, Markus Dürmuth...
125
Voted
HCI
2009
14 years 10 months ago
Social Adaptation of ERP Software: Tagging UI Elements
Abstract. In this paper we present a newly designed annotation and collaboration component, which has been prototypically implemented on top of an ERP (Enterprise Resource Planning...
Marcus Nitsche, Martin Christof Kindsmüller, ...
ANOR
2010
153views more  ANOR 2010»
14 years 10 months ago
Solving the Rectangular assignment problem and applications
The rectangular assignment problem is a generalization of the linear assignment problem (LAP): one wants to assign a number of persons to a smaller number of jobs, minimizing the ...
J. Bijsterbosch, A. Volgenant
127
Voted
FI
2010
175views more  FI 2010»
14 years 10 months ago
Applications and Security of Next-Generation, User-Centric Wireless Systems
: Pervasive wireless systems have significantly improved end-users' quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual inform...
Jerry Rick Ramstetter, Yaling Yang, Danfeng Yao
130
Voted
JITECH
2010
160views more  JITECH 2010»
14 years 7 months ago
Social software for business process modeling
Formal models of business processes are used for a variety of purposes. But where the elicitation of the characteristics of a business process usually takes place in a collaborati...
Agnes Koschmider, Minseok Song, Hajo A. Reijers