Sciweavers

62 search results - page 6 / 13
» User Modeling for Telecommunication Applications: Experience...
Sort
View
JCS
2010
135views more  JCS 2010»
14 years 8 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
IUI
2003
ACM
15 years 3 months ago
A model of textual affect sensing using real-world knowledge
This paper presents a novel way for assessing the affective qualities of natural language and a scenario for its use. Previous approaches to textual affect sensing have employed k...
Hugo Liu, Henry Lieberman, Ted Selker
WWW
2008
ACM
15 years 10 months ago
SMash: secure component model for cross-domain mashups on unmodified browsers
Mashup applications mix and merge content (data and code) from multiple content providers in a user's browser, to provide high-value web applications that can rival the user ...
Frederik De Keukelaere, Sumeer Bhola, Michael Stei...
ER
2006
Springer
137views Database» more  ER 2006»
15 years 1 months ago
Preference Functional Dependencies for Managing Choices
Abstract. The notion of user preference in database modeling has recently received much attention in advanced applications, such as personalization of e-services, since it captures...
Wilfred Ng
GLOBECOM
2007
IEEE
15 years 4 months ago
Mobility-Assisted Sensor Networking for Field Coverage
—In many sensor network applications, manual or well-controlled node deployment is not practical. Random deployments, e.g., from the air, often result in unevenly distributed nod...
Dan Wang, Jiangchuan Liu, Qian Zhang