Sciweavers

164 search results - page 33 / 33
» Mining advertiser-specific user behavior using adfactors
Sort
View
JUCS
2006
225views more  JUCS 2006»
13 years 4 months ago
Restricting the View and Connecting the Dots - Dangers of a Web Search Engine Monopoly
: Everyone realizes how powerful the few big Web search engine companies have become, both in terms of financial resources due to soaring stock quotes and in terms of the still hid...
Narayanan Kulathuramaiyer, Wolf-Tilo Balke
DBSEC
2000
138views Database» more  DBSEC 2000»
13 years 6 months ago
Discovery of Multi-Level Security Policies
With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce sec...
Christina Yip Chung, Michael Gertz, Karl N. Levitt
INTERACT
2007
13 years 6 months ago
Exploring Temporal Communication Through Social Networks
The dissemination of information in social networks and the relative effect of ICT (Information and Communications Technology) use has long been an interesting area of study in the...
Liaquat Hossain, Kon Shing Kenneth Chung, Shahriar...
ESWA
2008
219views more  ESWA 2008»
13 years 4 months ago
Business intelligence approach to supporting strategy-making of ISP service management
The recent deregulation of telecommunication industry by the Taiwanese government has brought about the acute competition for Internet Service Providers (ISP). Taiwan's ISP i...
Sheng-Tun Li, Li-Yen Shue, Shu-Fen Lee