Sciweavers

3943 search results - page 32 / 789
» The Personal Computer and Entrepreneurship
Sort
View
118
Voted
COLING
2010
14 years 8 months ago
Bipolar Person Name Identification of Topic Documents Using Principal Component Analysis
In this paper, we propose an unsupervised approach for identifying bipolar person names in a set of topic documents. We employ principal component analysis (PCA) to discover bipol...
Chien Chin Chen, Chen-Yuan Wu
PERCOM
2009
ACM
16 years 2 months ago
RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
In pervasive computing environments, personal information is expressed in digital forms to a great extent. Daily activities and personal preferences may be easily associated with p...
Feng Zhu, Wei Zhu
CCS
2008
ACM
15 years 3 months ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal
BIRTHDAY
2006
Springer
15 years 5 months ago
SharedLife: Towards Selective Sharing of Augmented Personal Memories
The rapid deployment of low-cost ubiquitous sensing devices
Wolfgang Wahlster, Alexander Kröner, Dominik ...
PSB
2010
15 years 8 days ago
Enabling Personal Genomics with an Explicit Test of Epistasis
Casey S. Greene, Daniel S. Himmelstein, Heather H....