Sciweavers

1573 search results - page 230 / 315
» Strong User Authentication
Sort
View
IJWIS
2007
117views more  IJWIS 2007»
15 years 1 months ago
Patterns and transitions of query reformulation during web searching
— Purpose: To investigate and identify the patterns of interaction between searchers and search engine during Web searching. Design: We examined 2,465,145 interactions from 534,5...
Bernard J. Jansen, Mimi Zhang, Amanda Spink
CSI
2004
353views more  CSI 2004»
15 years 1 months ago
Design and implementation of a mobile database for Java phones
Due to the popularity of electronic commerce and the maturity of wireless technology, mobile users can access the Internet anytime anywhere without having to physically hook up an...
Eric Jui-Lin Lu, Yung-Yuan Cheng
NOMS
2010
IEEE
189views Communications» more  NOMS 2010»
15 years 3 days ago
Self-optimization for handover oscillation control in LTE
— In this paper we analyze the performance of a self optimizing algorithm for handover parameter control which adjusts the settings depending on the oscillations experienced betw...
Jose Alonso-Rubio
TOPLAS
2010
115views more  TOPLAS 2010»
15 years 1 days ago
JavaCOP: Declarative pluggable types for java
program constraints are defined over a program’s abstract syntax tree. The JAVACOP compiler automatically enforces these constraints on programs during compilation. The JAVACOP ...
Shane Markstrum, Daniel Marino, Matthew Esquivel, ...
IVA
2010
Springer
14 years 11 months ago
Expression of Behaviors in Assistant Agents as Influences on Rational Execution of Plans
Assistant Agents help ordinary people about computer tasks, in many ways, thanks to their rational reasoning capabilities about the current model of the world. However they face st...
Jean-Paul Sansonnet, François Bouchet