: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Structured retrieval aims at exploiting the structural information of documents when searching for documents. Structured retrieval makes use of both content and structure of docum...
Saravadee Sae Tan, Tang Enya Kong, Gian Chand Sodh...
We propose a new incomplete algorithm for the Maximum Satisfiability (MaxSAT) problem on unweighted Boolean formulas, focused specifically on instances for which proving unsatis...
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers ...
This study addresses a long-standing and wellrecognized problem in KM research, namely the lack of a cumulative tradition. This problem is addressed by an intensive and critical r...