Sciweavers

1573 search results - page 197 / 315
» Strong User Authentication
Sort
View
93
Voted
CLEF
2009
Springer
15 years 2 months ago
Search Path Visualization and Session Performance Evaluation with Log Files
Our approach to the Log Analysis for Digital Societies (LADS) task of LogCLEF 2009 is to define three different levels of performance: success, failure and strong failure. To inve...
Katrin Lamm, Thomas Mandl, Ralph Koelle
91
Voted
KES
2010
Springer
15 years 6 days ago
Interaction Technique Combining Gripping and Pen Pressures
Abstract. We propose an interaction technique called “gripping” to improve the operation of input with pen-based interfaces. This operation involves a strong grip when holding ...
Yu Suzuki, Kazuo Misue, Jiro Tanaka
SIGCOMM
2012
ACM
13 years 4 months ago
Predicting location using mobile phone calls
Location prediction using mobile phone traces has attracted increasing attention. Owing to the irregular user mobility patterns, it still remains challenging to predict user locat...
Daqiang Zhang, Athanasios V. Vasilakos, Haoyi Xion...
CORR
2011
Springer
181views Education» more  CORR 2011»
14 years 8 months ago
Contract-Based Cooperative Spectrum Sharing
—Providing proper economic incentives is essential for the success of dynamic spectrum sharing. Cooperative spectrum sharing is one effective way to achieve this goal. In coopera...
Lingjie Duan, Lin Gao, Jianwei Huang
WWW
2009
ACM
16 years 2 months ago
Search result re-ranking based on gap between search queries and social tags
Both search engine click-through log and social annotation have been utilized as user feedback for search result re-ranking. However, to our best knowledge, no previous study has ...
Jun Yan, Ning Liu, Elaine Qing Chang, Lei Ji, Zhen...