Sciweavers

1573 search results - page 287 / 315
» Strong User Authentication
Sort
View
72
Voted
EUSFLAT
2009
126views Fuzzy Logic» more  EUSFLAT 2009»
14 years 7 months ago
A Conceptual Framework for Understanding a Fuzzy System
The word Interpretability is becoming more and more frequent in the fuzzy literature. It is admitted as the main advantage of fuzzy systems and it should be given a main role in fu...
José M. Alonso, Luis Magdalena
HCI
2009
14 years 7 months ago
Trail Patterns in Social Tagging Systems: Role of Tags as Digital Pheromones
The popularity of social information systems has been driven by their ability to help users manage, organize and share online resources. Though the research exploring the use of ta...
Thomas George Kannampallil, Wai-Tat Fu
86
Voted
ICIP
2009
IEEE
14 years 7 months ago
Blind deblurring of foreground-background images
This paper presents a method for deblurring an image consisting of two layers (a foreground layer and a background layer) which have suffered different, unknown blurs. This is a s...
Mariana S. C. Almeida, Luis B. Almeida
CHI
2010
ACM
14 years 6 months ago
Connect 2 congress: visual analytics for civic oversight
Strong representative democracies rely on educated, informed, and active citizenry to provide oversight of the government. We present Connect 2 Congress (C2C), a novel, high tempo...
Peter Kinnaird, Mario Romero, Gregory D. Abowd
ISR
2010
14 years 4 months ago
Use of Pricing Schemes for Differentiating Information Goods
Information goods vendors offer different pricing schemes such as per user pricing and site licensing. Why do competing sellers adopt different pricing schemes for the same inform...
Vidyanand Choudhary