Sciweavers

108 search results - page 21 / 22
» User Profile Refinement Using Explicit User Interest Modelin...
Sort
View
CCS
2008
ACM
13 years 8 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis
P2P
2007
IEEE
14 years 17 days ago
PEPINO: PEer-to-Peer network INspectOr
PEPINO is a simple and effective peer-to-peer network inspector. It visualises not only meaningful pointers and connections between peers, but also the exchange of messages betwee...
Donatien Grolaux, Boris Mejías, Peter Van R...
SI3D
1997
ACM
13 years 10 months ago
Two-Handed Direct Manipulation on the Responsive Workbench
We have built a system that allows users to naturally manipulate virtual 3D models with both hands on the Responsive Workbench, a tabletop VR device. Our design is largely based u...
Lawrence D. Cutler, Bernd Fröhlich, Pat Hanra...
LREC
2010
141views Education» more  LREC 2010»
13 years 7 months ago
Resources for Calendar Expressions Semantic Tagging and Temporal Navigation through Texts
The linguistic resources presented in this paper are designed for the recognition and semantic tagging of calendar expressions in French. While existing resources generally put th...
Charles Teissèdre, Delphine Battistelli, Je...
CIVR
2008
Springer
239views Image Analysis» more  CIVR 2008»
13 years 8 months ago
Analyzing Flickr groups
There is an explosion of community-generated multimedia content available online. In particular, Flickr constitutes a 200-million photo sharing system where users participate foll...
Radu Andrei Negoescu, Daniel Gatica-Perez