Sciweavers

5234 search results - page 242 / 1047
» Method Components - Rationale Revealed
Sort
View
ICDM
2009
IEEE
167views Data Mining» more  ICDM 2009»
15 years 10 months ago
A Framework for Computing the Privacy Scores of Users in Online Social Networks
—A large body of work has been devoted to address corporate-scale privacy concerns related to social networks. The main focus was on how to share social networks owned by organiz...
Kun Liu, Evimaria Terzi
SIGIR
2009
ACM
15 years 10 months ago
Automatic video tagging using content redundancy
The analysis of the leading social video sharing platform YouTube reveals a high amount of redundancy, in the form of videos with overlapping or duplicated content. In this paper,...
Stefan Siersdorfer, José San Pedro, Mark Sa...
ICPADS
2007
IEEE
15 years 10 months ago
Performance analysis on mobile agent-based parallel information retrieval approaches
—The main concern of the Internet user-base has shifted from what kind of information are available to how to find the desired information on the Internet thanks to the explosiv...
Wenyu Qu, Masaru Kitsuregawa, Keqiu Li
WCRE
2005
IEEE
15 years 9 months ago
Enriching Reverse Engineering with Semantic Clustering
Understanding a software system by just analyzing the structure of the system reveals only half of the picture, since the structure tells us only how the code is working but not w...
Adrian Kuhn, Stéphane Ducasse, Tudor G&icir...
ACMSE
2005
ACM
15 years 9 months ago
Token-based dynamic trust establishment for web services
Despite recent advances in trust relationship control mechanisms, issues remain that impede the development of effective trust models. One of these is the lack of dynamic mechanis...
Zhengping Wu, Alfred C. Weaver