Sciweavers

67 search results - page 13 / 14
» Designing novel review ranking systems: predicting the usefu...
Sort
View
DOCENG
2004
ACM
13 years 11 months ago
Techniques for authoring complex XML documents
This paper reviews the main innovations of XML and considers their impact on the editing techniques for structured documents. Namespaces open the way to compound documents; well-f...
Vincent Quint, Irène Vatton
CCS
2004
ACM
13 years 11 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
MICRO
2009
IEEE
129views Hardware» more  MICRO 2009»
14 years 12 days ago
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the contro...
Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederi...
RECSYS
2010
ACM
13 years 6 months ago
Global budgets for local recommendations
We present the design, implementation and evaluation of a new geotagging service, Gloe, that makes it easy to find, rate and recommend arbitrary on-line content in a mobile settin...
Thomas Sandholm, Hang Ung, Christina Aperjis, Bern...
IJIIDS
2008
201views more  IJIIDS 2008»
13 years 5 months ago
MALEF: Framework for distributed machine learning and data mining
: Growing importance of distributed data mining techniques has recently attracted attention of researchers in multiagent domain. Several agent-based application have been already c...
Jan Tozicka, Michael Rovatsos, Michal Pechoucek, S...