نتایج جستجو برای: profile software

تعداد نتایج: 649666  

2004
Soldal Lund Folker den Braber Ketil Stølen Fredrik Vraalsen Ida Solheim Mass Soldal Lund

Methods for identification and analysis of security risks make use of structured brainstorming sessions. The effectiveness of such sessions depends on the extent to which the stakeholders and analysts involved understand and are understood by each other. Since such sessions involve people with different backgrounds and competencies, like users, system-developers, decision makers and system mana...

Journal: :CoRR 2010
P. Srinivasulu J. Ranga Rao I. Ramesh Babu

----------------------------------------------ABSTRACT-------------------------------------------In the faceless world of the Internet, online fraud is one of the greatest reasons of loss for web merchants. Advanced solutions are needed to protect e-businesses from the constant problems of fraud. Many popular fraud detection algorithms require supervised training, which needs human intervention...

1996
Randall J. Calistri-Yeh Alberto Maria Segre David Sturgill

The ALPS (Adaptive Learning and Planning System) project is a three-year effort to design and prototype a next-generation adaptive planning architecture as part of the ARPA / Rome Laboratory Planning Initiative (ARPI). ALPS is being used.within the Planning Initiative to perform large-scale military transportation scheduling, taking a Time-Phased Force Deployment Data (TPFDD) file with thousand...

2002
H. Sevay C. Tsatsoulis

This chapter presents an agent-based approach to intelligent information dissemination in dynamic environments. We will describe a prototype agent-based system, called the Anticipator, which enables an information dissemination system to adapt to changing information needs of users and provide the users with critical information relevant to those dynamic changes. The Anticipator models the info...

2006
Duong Phan David A. Bryan Bruce B. Lowekamp

Nowadays, peer-to-peer (P2P) applications are in vogue everywhere. Business models have been defined and setup in order to take profit from their decentralized and low-cost architectures. One of the most promising revenue potential market is the sector of Voice over Internet Protocol (VoIP or Internet telephony) systems which have even brought telephone companies fright and concern. The success...

Journal: :IACR Cryptology ePrint Archive 2014
Igor Bilogrevic Julien Freudiger Emiliano De Cristofaro Ersin Uzun

Abstract Over the past few years, online service providers have started gathering increasing amounts of personal information to build user profiles and monetize them with advertisers and data brokers. Users have little control of what information is processed and are often left with an all-or-nothing decision between receiving free services or refusing to be profiled. This paper explores an alt...

2009
Greg Kaplan Giovanni L. Violante

We assess the degree of consumption smoothing implicit in a calibrated life-cycle version of the standard incomplete-markets model, and we compare it to the empirical estimates of Blundell et al. (2008) (BPP thereafter). We find that households in the model have access to less consumption smoothing against permanent earnings shocks than what is measured in the data. BPP estimate that 36% of per...

1996
Chae Hoon Lim Pil Joong Lee

This paper presents a directed (or designated-receiver) signature scheme with the property that the signature can be veriied only with the help of the signature receiver. Such signatures are intended to protect the privacy of the signature receiver in applications where the signed message contains information personally sensitive to the receiver. We also present its application to shared veriic...

2002
Luís Miguel Pinho Francisco Vasques

This paper proposes an environment intended for the development of fault-tolerant real-time Ada 95 applications conforming to the Ravenscar profile. This environment is based on the transparent replication of application components, and it provides a set of generic task interaction objects, which are used as the basic building blocks of the supported applications. These objects provide the usua...

2005
Sofia Tsekeridou

The paper presents an MPEG−7 Multimedia Description Schemes (MDS)−based metadata and user profile model used within an enhanced DTV environment for semantic annotation and personalized access to multiple sports DTV services. It is shown that in order to enable intelligent and personalized processing, management and use of multimedia content and services, the use of application specific metadata...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید