Sciweavers

945 search results - page 77 / 189
» Detective Information Flow Analysis for Business Processes
Sort
View
WWW
2004
ACM
16 years 2 months ago
Newsjunkie: providing personalized newsfeeds via analysis of information novelty
We present a principled methodology for filtering news stories by formal measures of information novelty, and show how the techniques can be used to custom-tailor newsfeeds based ...
Evgeniy Gabrilovich, Susan T. Dumais, Eric Horvitz
HICSS
2003
IEEE
139views Biometrics» more  HICSS 2003»
15 years 7 months ago
Modeling of information dominance in complex systems: A system partitioning and hybrid control framework
This paper1 provides a view of modeling the information dominance problem of military systems as representative of modeling other complex systems. The ideas are an extension of ea...
John R. James
VIZSEC
2004
Springer
15 years 7 months ago
Email archive analysis through graphical visualization
The analysis of the vast storehouse of email content accumulated or produced by individual users has received relatively little attention other than for specific tasks such as spa...
Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo
COLCOM
2008
IEEE
15 years 8 months ago
Incentive and Trust Issues in Assured Information Sharing
Assured information sharing among different organizations in a coalitional environment is an important first step in accomplishing many critical tasks. For example, different secur...
Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thur...
PLDI
1990
ACM
15 years 6 months ago
A Fresh Look at Optimizing Array Bound Checking
- This paper describes techniques for optimizing range checks performed to detect array bound violations. In addition to the elimination of range check:s, the optimizations discuss...
Rajiv Gupta