Sciweavers

511 search results - page 81 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
140
Voted
SIGIR
2010
ACM
15 years 7 months ago
Ready to buy or just browsing?: detecting web searcher goals from interaction data
An improved understanding of the relationship between search intent, result quality, and searcher behavior is crucial for improving the effectiveness of web search. While recent p...
Qi Guo, Eugene Agichtein
150
Voted
CCGRID
2003
IEEE
15 years 9 months ago
A-peer: An Agent Platform Integrating Peer-to-Peer Network
Peer-to-Peer (p2p), as an emerging technology, is exerting huge influence on various application scenarios. Meanwhile, agents, assisting applications in traditional paradigm with...
Tieyan Li, Zhi-Gang Zhao, Si-Zhen Yo
150
Voted
WWW
2005
ACM
16 years 4 months ago
Middleware services for web service compositions
WS-* specifications cover a variety of issues ranging from security and reliability to transaction support in web services. However, these specifications do not address web servic...
Anis Charfi, Mira Mezini
147
Voted
CCS
2009
ACM
16 years 4 months ago
The union-split algorithm and cluster-based anonymization of social networks
Knowledge discovery on social network data can uncover latent social trends and produce valuable findings that benefit the welfare of the general public. A growing amount of resea...
Brian Thompson, Danfeng Yao
152
Voted
CHINZ
2008
ACM
15 years 5 months ago
Interactive visualisation techniques for dynamic speech transcription, correction and training
As performance gains in automatic speech recognition systems plateau, improvements to existing applications of speech recognition technology seem more likely to come from better u...
Saturnino Luz, Masood Masoodian, Bill Rogers