Sciweavers

6944 search results - page 1349 / 1389
» Web service interfaces
Sort
View
130
Voted
WSDM
2012
ACM
243views Data Mining» more  WSDM 2012»
13 years 8 months ago
No search result left behind: branching behavior with browser tabs
Today’s Web browsers allow users to open links in new windows or tabs. This action, which we call ‘branching’, is sometimes performed on search results when the user plans t...
Jeff Huang, Thomas Lin, Ryen W. White
187
Voted
ICDE
2008
IEEE
167views Database» more  ICDE 2008»
16 years 2 months ago
Automatic Extraction of Useful Facet Hierarchies from Text Databases
Databases of text and text-annotated data constitute a significant fraction of the information available in electronic form. Searching and browsing are the typical ways that users ...
Wisam Dakka, Panagiotis G. Ipeirotis
118
Voted
MOBISYS
2008
ACM
16 years 7 days ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...
99
Voted
IDTRUST
2009
ACM
15 years 7 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
123
Voted
WISEC
2009
ACM
15 years 7 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...
« Prev « First page 1349 / 1389 Last » Next »