Sciweavers

365 search results - page 68 / 73
» Determining Internet Users' Values for Private Information
Sort
View
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
15 years 1 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes
WWW
2008
ACM
15 years 10 months ago
Contextual advertising by combining relevance with click feedback
Contextual advertising supports much of the Web's ecosystem today. User experience and revenue (shared by the site publisher ad the ad network) depend on the relevance of the...
Deepayan Chakrabarti, Deepak Agarwal, Vanja Josifo...
WWW
2011
ACM
14 years 4 months ago
A case for query by image and text content: searching computer help using screenshots and keywords
The multimedia information retrieval community has dedicated extensive research effort to the problem of content-based image retrieval (CBIR). However, these systems find their ma...
Tom Yeh, Brandyn White, Jose San Pedro, Boris Katz...
OTM
2007
Springer
15 years 3 months ago
Translating XPath Queries into SPARQL Queries
Abstract The W3C has developed XPath [3] as a query language for XML data. XPath is embedded in many other languages like XQuery and XSLT. The name of XPath derives from its basic ...
Matthias Droop, Markus Flarer, Jinghua Groppe, Sve...
JCDL
2006
ACM
147views Education» more  JCDL 2006»
15 years 3 months ago
The social life of books in the humane library
The development of public libraries may have inadvertently brought the age of marginalia to a close but the advent of digital libraries could revive the practice of marginal annot...
Yoram Chisik, Nancy Kaplan