Sciweavers

1573 search results - page 243 / 315
» Strong User Authentication
Sort
View
BIS
2010
197views Business» more  BIS 2010»
14 years 7 months ago
Ubiquitous Microblogging: A Flow-Based Front-End for Information Logistics
The success of information supply strongly depends on successful user adoption. This especially is the case for the integration of non-human information sources deriving from ubiqu...
Martin Böhringer, Martin Gaedke
GLOBECOM
2010
IEEE
14 years 7 months ago
Is High Quality Sensing Really Necessary for Opportunistic Spectrum Usage?
The major requirement for Cognitive Radio (CR) based opportunistic spectrum re-usage is reliable protection of the primary communication. This calls for a reliable detection of the...
Christian Dombrowski, Daniel Willkomm, Adam Wolisz
GROUP
2010
ACM
14 years 7 months ago
The human factors of consistency maintenance in multiplayer computer games
Consistency maintenance (CM) techniques are a crucial part of many distributed systems, and are particularly important in networked games. In this paper we describe a framework of...
Cheryl Savery, T. C. Nicholas Graham, Carl Gutwin
INFOCOM
2010
IEEE
14 years 7 months ago
PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems
People-centric urban sensing is a new paradigm gaining popularity. A main obstacle to its widespread deployment and adoption are the privacy concerns of participating individuals. ...
Jing Shi, Rui Zhang, Yunzhong Liu, Yanchao Zhang
EMNLP
2009
14 years 7 months ago
Mining Search Engine Clickthrough Log for Matching N-gram Features
User clicks on a URL in response to a query are extremely useful predictors of the URL's relevance to that query. Exact match click features tend to suffer from severe data s...
Huihsin Tseng, Longbin Chen, Fan Li, Ziming Zhuang...