The individual vulnerabilities of hosts on a network can be combined by an attacker to gain access that would not be possible if the hosts were not interconnected. Currently avail...
Blogs are a new form of internet phenomenon and a vast everincreasing information resource. Mining blog files for information is a very new research direction in data mining. We p...
Abstract. For document-centric work, meta-information in form of annotations has proven useful to enhance search and other retrieval tasks. The Mymory project1 uses a web-based wor...
Malte Kiesel, Sven Schwarz, Ludger van Elst, Georg...
Implicit feedback algorithms utilize interaction between searchers and search systems to learn more about users’ needs and interests than expressed in query statements alone. Th...
We apply fillets — smoothing of sharp angles at the joints — between the connections and nodes of graph-like diagrams. In situations where the graph layout is constrained, e....
Tuomas J. Lukka, Janne V. Kujala, Marketta Niemel&...