Sciweavers

62 search results - page 6 / 13
» User Modeling for Telecommunication Applications: Experience...
Sort
View
120
Voted
JCS
2010
135views more  JCS 2010»
15 years 8 days ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
119
Voted
IUI
2003
ACM
15 years 7 months ago
A model of textual affect sensing using real-world knowledge
This paper presents a novel way for assessing the affective qualities of natural language and a scenario for its use. Previous approaches to textual affect sensing have employed k...
Hugo Liu, Henry Lieberman, Ted Selker
94
Voted
WWW
2008
ACM
16 years 2 months ago
SMash: secure component model for cross-domain mashups on unmodified browsers
Mashup applications mix and merge content (data and code) from multiple content providers in a user's browser, to provide high-value web applications that can rival the user ...
Frederik De Keukelaere, Sumeer Bhola, Michael Stei...
ER
2006
Springer
137views Database» more  ER 2006»
15 years 5 months ago
Preference Functional Dependencies for Managing Choices
Abstract. The notion of user preference in database modeling has recently received much attention in advanced applications, such as personalization of e-services, since it captures...
Wilfred Ng
GLOBECOM
2007
IEEE
15 years 8 months ago
Mobility-Assisted Sensor Networking for Field Coverage
—In many sensor network applications, manual or well-controlled node deployment is not practical. Random deployments, e.g., from the air, often result in unevenly distributed nod...
Dan Wang, Jiangchuan Liu, Qian Zhang