Sciweavers

3505 search results - page 171 / 701
» Information Theory and the IrisCode
Sort
View
WSNA
2003
ACM
15 years 3 months ago
Information assurance in sensor networks
Sensor networks are deployed to monitor the surroundings and keep the end-user informed about the events witnessed. Different types of events have different levels of importance f...
Budhaditya Deb, Sudeept Bhatnagar, Badri Nath
CIKM
2009
Springer
15 years 4 months ago
P-Rank: a comprehensive structural similarity measure over information networks
With the ubiquity of information networks and their broad applications, the issue of similarity computation between entities of an information network arises and draws extensive r...
Peixiang Zhao, Jiawei Han, Yizhou Sun
CIKM
2009
Springer
15 years 4 months ago
Using multiple ontologies in information extraction
Ontology-Based Information Extraction (OBIE) has recently emerged as a subfield of Information Extraction (IE). Here, ontologies - which provide formal and explicit specificatio...
Daya C. Wimalasuriya, Dejing Dou
PSYCHNOLOGY
2006
70views more  PSYCHNOLOGY 2006»
14 years 10 months ago
Navigating Information Space: Web site design and lessons from the built environment
The Web is the archetypal information space but even on a well designed site it can be difficult to find all the information you need. It is impossible to design a site so that al...
David Benyon
CCS
2005
ACM
15 years 3 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu