Sciweavers

744 search results - page 65 / 149
» The Traust Authorization Service
Sort
View
IUI
2012
ACM
13 years 5 months ago
Mobile texting: can post-ASR correction solve the issues? an experimental study on gain vs. costs
The next big step in embedded, mobile speech recognition will be to allow completely free input as it is needed for messaging like SMS or email. However, unconstrained dictation r...
Michael Feld, Saeedeh Momtazi, Farina Freigang, Di...
ACL
2012
13 years 10 days ago
Social Event Radar: A Bilingual Context Mining and Sentiment Analysis Summarization System
Social Event Radar is a new social networking-based service platform, that aim to alert as well as monitor any merchandise flaws, food-safety related issues, unexpected eruption o...
Wen-Tai Hsieh, Chen Ming Wu, Tsun Ku, Seng-cho Tim...
IWSOS
2007
Springer
15 years 4 months ago
Automated Trust Negotiation in Autonomic Environments
Autonomic computing environments rely on devices that are able to make intelligent decisions without human supervision. Automated Trust Negotiation supports the cooperation of devi...
Andreas Klenk, Frank Petri, Benoit Radier, Mika&eu...
OZCHI
2006
ACM
15 years 3 months ago
Using a scenario-planning tool to support an engaging online user experience
This paper describes a pilot project to research the use of a dynamic visual interface as the basis of a scenarioplanning tool. We introduce ‘flow’ as a theoretical framework ...
Jon M. Pearce, John Murphy, David Patman
ACSAC
2005
IEEE
15 years 3 months ago
Layering Public Key Distribution Over Secure DNS using Authenticated Delegation
We present the Internet Key Service (IKS), a distributed architecture for authenticated distribution of public keys, layered on Secure DNS (DNSSEC). Clients use DNSSEC to securely...
John P. Jones, Daniel F. Berger, Chinya V. Ravisha...