Sciweavers

464 search results - page 42 / 93
» Authorisation Using Attributes from Multiple Authorities
Sort
View
SDM
2010
SIAM
256views Data Mining» more  SDM 2010»
14 years 11 months ago
The Application of Statistical Relational Learning to a Database of Criminal and Terrorist Activity
We apply statistical relational learning to a database of criminal and terrorist activity to predict attributes and event outcomes. The database stems from a collection of news ar...
B. Delaney, Andrew S. Fast, W. M. Campbell, C. J. ...
CHI
2010
ACM
15 years 4 months ago
Gender demographic targeting in sponsored search
In this research, we evaluate the effect of gender in analyzing the performance of sponsored search advertising. We examine a log file with data comprised of nearly 7,000,000 reco...
Bernard J. Jansen, Lauren Solomon
CTRSA
2004
Springer
106views Cryptology» more  CTRSA 2004»
15 years 1 months ago
Improving Robustness of PGP Keyrings by Conflict Detection
Abstract. Secure authentication frequently depends on the correct recognition of a user's public key. When there is no certificate authority, this key is obtained from other u...
Qinglin Jiang, Douglas S. Reeves, Peng Ning
ISMIS
1999
Springer
15 years 2 months ago
A Statistical Approach to Rule Selection in Semantic Query Optimisation
Semantic Query Optimisation makes use of the semantic knowledge of a database (rules) to perform query transformation. Rules are normally learned from former queries fired by the u...
Barry G. T. Lowden, Jerome Robinson
PET
2010
Springer
15 years 1 months ago
Making a Nymbler Nymble Using VERBS
In this work, we propose a new platform to enable service providers, such as web site operators, on the Internet to block past abusive users of anonymizing networks (for example, T...
Ryan Henry, Kevin Henry, Ian Goldberg