Sciweavers

9494 search results - page 1686 / 1899
» Gaussian Process Networks
Sort
View
137
Voted
SIGIR
2006
ACM
15 years 10 months ago
Contextual search and name disambiguation in email using graphs
Similarity measures for text have historically been an important tool for solving information retrieval problems. In many interesting settings, however, documents are often closel...
Einat Minkov, William W. Cohen, Andrew Y. Ng
VRST
2006
ACM
15 years 10 months ago
Media productions for a dome display system
As the interest of the public for new forms of media grows, museums and theme parks select real time Virtual Reality productions as their presentation medium. Based on threedimens...
Athanasios Gaitatzes, Georgios Papaioannou, Dimitr...
WIKIS
2006
ACM
15 years 10 months ago
OntoWiki: community-driven ontology engineering and ontology usage based on Wikis
Ontologies are consensual representations of a domain of discourse and the backbone of the future Semantic Web. Currently, however, only a fraction of Web users can take part in t...
Martin Hepp, Daniel Bachlechner, Katharina Siorpae...
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
15 years 10 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
ACSAC
2005
IEEE
15 years 9 months ago
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers
An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are gr...
Weidong Cui, Randy H. Katz, Wai-tian Tan
« Prev « First page 1686 / 1899 Last » Next »