Sciweavers

1573 search results - page 243 / 315
» Strong User Authentication
Sort
View
151
Voted
BIS
2010
197views Business» more  BIS 2010»
15 years 24 days ago
Ubiquitous Microblogging: A Flow-Based Front-End for Information Logistics
The success of information supply strongly depends on successful user adoption. This especially is the case for the integration of non-human information sources deriving from ubiqu...
Martin Böhringer, Martin Gaedke
119
Voted
GLOBECOM
2010
IEEE
15 years 23 days ago
Is High Quality Sensing Really Necessary for Opportunistic Spectrum Usage?
The major requirement for Cognitive Radio (CR) based opportunistic spectrum re-usage is reliable protection of the primary communication. This calls for a reliable detection of the...
Christian Dombrowski, Daniel Willkomm, Adam Wolisz
127
Voted
GROUP
2010
ACM
15 years 23 days ago
The human factors of consistency maintenance in multiplayer computer games
Consistency maintenance (CM) techniques are a crucial part of many distributed systems, and are particularly important in networked games. In this paper we describe a framework of...
Cheryl Savery, T. C. Nicholas Graham, Carl Gutwin
113
Voted
INFOCOM
2010
IEEE
15 years 21 days ago
PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems
People-centric urban sensing is a new paradigm gaining popularity. A main obstacle to its widespread deployment and adoption are the privacy concerns of participating individuals. ...
Jing Shi, Rui Zhang, Yunzhong Liu, Yanchao Zhang
131
Voted
EMNLP
2009
15 years 17 days ago
Mining Search Engine Clickthrough Log for Matching N-gram Features
User clicks on a URL in response to a query are extremely useful predictors of the URL's relevance to that query. Exact match click features tend to suffer from severe data s...
Huihsin Tseng, Longbin Chen, Fan Li, Ziming Zhuang...