Sciweavers

8479 search results - page 1573 / 1696
» Data Extraction from Web Data Sources
Sort
View
CIKM
2009
Springer
15 years 10 months ago
A machine learning approach for improved BM25 retrieval
Despite the widespread use of BM25, there have been few studies examining its effectiveness on a document description over single and multiple field combinations. We determine t...
Krysta Marie Svore, Christopher J. C. Burges
CHIMIT
2009
ACM
15 years 9 months ago
Scripting practices in complex systems management
System administrators are end-users too. And as end-users, they develop tools, create web pages, write command-line scripts, use spreadsheets, and repurpose existing tools. In sho...
Eser Kandogan, Paul P. Maglio, Eben M. Haber, John...
WOWMOM
2009
ACM
151views Multimedia» more  WOWMOM 2009»
15 years 9 months ago
Distributed user authentication in wireless LANs
—An increasing number of mobile devices, including smartphones, use WLAN for accessing the Internet. Existing WLAN authentication mechanisms are either disruptive, such as presen...
Dmitriy Kuptsov, Andrey Khurri, Andrei Gurtov
195
Voted
ACSAC
2008
IEEE
15 years 9 months ago
Please Permit Me: Stateless Delegated Authorization in Mashups
Mashups have emerged as a Web 2.0 phenomenon, connecting disjoint applications together to provide unified services. However, scalable access control for mashups is difficult. T...
Ragib Hasan, Marianne Winslett, Richard M. Conlan,...
IAT
2008
IEEE
15 years 9 months ago
An Ontology-Driven Framework for Deploying JADE Agent Systems
Multi-agent systems have proven to be a powerful technology for building complex distributed applications. However, the process of designing, configuring and deploying agent-based...
Csongor Nyulas, Martin J. O'Connor, Samson W. Tu, ...
« Prev « First page 1573 / 1696 Last » Next »