Sciweavers

11129 search results - page 69 / 2226
» Modeling Search Computing Applications
Sort
View
CCS
2001
ACM
15 years 2 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
DEXAW
1995
IEEE
93views Database» more  DEXAW 1995»
15 years 1 months ago
Meta Modeling for End User Computing
Inherent constraints play an important role in the semantic Xplain model. These constraints enable us to represent certain real world knowledge once for subsequent use in several ...
J. H. ter Bekke
ESWS
2008
Springer
14 years 11 months ago
Concept Search: Semantics Enabled Syntactic Search
Abstract. Historically, information retrieval (IR) has followed two principally different paths that we call syntactic IR and semantic IR. In syntactic IR, terms are represented as...
Fausto Giunchiglia, Uladzimir Kharkevich, Ilya Zai...
COLING
2010
14 years 5 months ago
Citation Author Topic Model in Expert Search
This paper proposes a novel topic model, Citation-Author-Topic (CAT) model that addresses a semantic search task we define as expert search
Yuancheng Tu, Nikhil Johri, Dan Roth, Julia Hocken...
CORR
2011
Springer
160views Education» more  CORR 2011»
14 years 5 months ago
When is social computation better than the sum of its parts?
good solutions to complex problems. In many examples, individuals trying to solve superior global solution. This suggests that there may be general principles of information aggre...
Vadas Gintautas, Aric A. Hagberg, Luís M. A...