Sciweavers

1990 search results - page 324 / 398
» Conceptual User Tracking
Sort
View
CCS
2007
ACM
15 years 8 months ago
Covert channels in privacy-preserving identification systems
We examine covert channels in privacy-enhanced mobile identification devices where the devices uniquely identify themselves to an authorized verifier. Such devices (e.g. RFID tags)...
Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels
ECIR
2007
Springer
15 years 6 months ago
Enhancing Expert Search Through Query Modeling
An expert finding is a very common task among enterprise search activities, while its usual retrieval performance is far from the quality of the Web search. Query modeling helps t...
Pavel Serdyukov, Sergey Chernov, Wolfgang Nejdl
LREC
2008
115views Education» more  LREC 2008»
15 years 6 months ago
Evaluating Robustness Of A QA System Through A Corpus Of Real-Life Questions
This paper presents the sequential evaluation of the question answering system SQuaLIA. This system is based on the same sequential process as most statistical question answering ...
Laurianne Sitbon, Patrice Bellot, Philippe Blache
SCS
2004
15 years 5 months ago
HazLog: Tool Support for Hazard Management
Industry is increasingly adopting software and system safety standards that mandate the use of hazard logs in the development and operation of safety critical systems. Hazard logs...
Christian Hamoy, David Hemer, Peter A. Lindsay
BMCBI
2005
124views more  BMCBI 2005»
15 years 4 months ago
Internet-based profiler system as integrative framework to support translational research
Background: Translational research requires taking basic science observations and developing them into clinically useful tests and therapeutics. We have developed a process to dev...
Robert Kim, Francesca Demichelis, Jeffery Tang, Al...