Sciweavers

480 search results - page 40 / 96
» Portrait: Generating Personal Presentations
Sort
View
SIGIR
2004
ACM
15 years 3 months ago
Implicit queries (IQ) for contextualized search
The Implicit Query (IQ) prototype is a system which automatically generates context-sensitive searches based on a user’s current computing activities. In the demo, we show IQ ru...
Susan T. Dumais, Edward Cutrell, Raman Sarin, Eric...
FIS
2008
14 years 11 months ago
Unlock Your Data: The Case of MyTag
The business model of Web2.0 applications like FaceBook, Flickr, YouTube and their likes is based on an asymmetry: Users generate content, Web2.0 application providers own, (i), th...
Thomas Franz, Klaas Dellschaft, Steffen Staab
IUI
2004
ACM
15 years 3 months ago
What would they think?: a computational model of attitudes
A key to improving at any task is frequent feedback from people whose opinions we care about: our family, friends, mentors, and the experts. However, such input is not usually ava...
Hugo Liu, Pattie Maes
JCDL
2004
ACM
198views Education» more  JCDL 2004»
15 years 3 months ago
Finding authoritative people from the web
Today’s web is so huge and diverse that it arguably reflects the real world. For this reason, searching the web is a promising approach to find things in the real world. This ...
Masanori Harada, Shin-ya Sato, Kazuhiro Kazama
PAIRING
2010
Springer
152views Cryptology» more  PAIRING 2010»
14 years 8 months ago
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these dev...
Koen Simoens, Roel Peeters, Bart Preneel