Sciweavers

2846 search results - page 492 / 570
» Personalization of a Trust Network
Sort
View
JOCN
2010
66views more  JOCN 2010»
14 years 7 months ago
fMRI Activation during Observation of Others' Reach Errors
When exposed to novel dynamical conditions (e.g., externally imposed forces), neurologically intact subjects easily adjust motor commands on the basis of their own reaching errors...
Nicole Malfait, Kenneth F. Valyear, Jody C. Culham...
PUC
2010
138views more  PUC 2010»
14 years 7 months ago
Design and implementation of a VoiceXML-driven wiki application for assistive environments on the web
In this paper, we describe the design and implementation of an audio wiki application accessible via both the Public Switched Telephone Network and the Internet. The application ex...
Constantinos Kolias, Vassilis Kolias, Ioannis Anag...
157
Voted
CORR
2011
Springer
193views Education» more  CORR 2011»
14 years 4 months ago
How Unique and Traceable are Usernames?
Abstract. Usernames are ubiquitously used for identification and authentication purposes on web services and the Internet at large, ranging from the local-part of email addresses ...
Daniele Perito, Claude Castelluccia, Mohamed Ali K...
245
Voted
CEC
2011
IEEE
14 years 17 days ago
Modeling HIV spread through sexual contact using a cellular automaton
Abstract—Having a risky sexual behavior increases the likelihood of infection by the Human Immunodeficiency Virus (HIV), which causes the Acquired Immunodeficiency Syndrome (AI...
Azadeh Alimadad, Vahid Dabbaghian, Suraj K. Singhk...
SIGCOMM
2012
ACM
13 years 3 months ago
Predicting location using mobile phone calls
Location prediction using mobile phone traces has attracted increasing attention. Owing to the irregular user mobility patterns, it still remains challenging to predict user locat...
Daqiang Zhang, Athanasios V. Vasilakos, Haoyi Xion...