Sciweavers

7381 search results - page 1464 / 1477
» The age of human computer interaction
Sort
View
CCS
2009
ACM
15 years 4 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
MOBILITY
2009
ACM
15 years 4 months ago
A membership management protocol for mobile P2P networks
MANETs are self-organizing networks composed of mobile wireless nodes with often scarce resources. Distributed applications based on the P2P paradigm are by nature good candidates...
Mohamed Karim Sbai, Emna Salhi, Chadi Barakat
RECSYS
2009
ACM
15 years 4 months ago
Increasing engagement through early recommender intervention
Social network sites rely on the contributions of their members to create a lively and enjoyable space. Recent research has focused on using personalization and recommender techno...
Jill Freyne, Michal Jacovi, Ido Guy, Werner Geyer
SIGDOC
2009
ACM
15 years 4 months ago
Facilita: reading assistance for low-literacy readers
Texts are the media content primarily available on Web sites and applications. However, this heavy use of texts creates an accessibility barrier to those who cannot read fluently...
Willian Massami Watanabe, Arnaldo Candido Junior, ...
SIGIR
2009
ACM
15 years 4 months ago
Detecting spammers and content promoters in online video social networks
A number of online video social networks, out of which YouTube is the most popular, provides features that allow users to post a video as a response to a discussion topic. These f...
Fabrício Benevenuto, Tiago Rodrigues, Virg&...
« Prev « First page 1464 / 1477 Last » Next »