Sciweavers

1310 search results - page 120 / 262
» Modelling and Using Imperfect Context Information
Sort
View
144
Voted
CCS
2006
ACM
15 years 7 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
108
Voted
CHI
2005
ACM
16 years 3 months ago
A study on the use of semaphoric gestures to support secondary task interactions
We present results of a study that considers (a) gestures outside the context of a specific implementation and (b) their use in supporting secondary, rather than primary tasks in ...
Maria Karam, Monica M. C. Schraefel
101
Voted
ICPR
2010
IEEE
15 years 1 months ago
Word Clustering Using PLSA Enhanced with Long Distance Bigrams
Probabilistic latent semantic analysis is enhanced with long distance bigram models in order to improve word clustering. The long distance bigram probabilities and the interpolate...
Nikoletta Bassiou, Constantine Kotropoulos
115
Voted
SIGIR
2006
ACM
15 years 9 months ago
User modeling for full-text federated search in peer-to-peer networks
User modeling for information retrieval has mostly been studied to improve the effectiveness of information access in centralized repositories. In this paper we explore user model...
Jie Lu, James P. Callan
132
Voted
ECIR
2006
Springer
15 years 4 months ago
A Comparative Study of the Effectiveness of Search Result Presentation on the Web
Presentation of search results in Web-based information retrieval (IR) systems has been dominated by a textual form of information such as the title, snippet, URL, and/or file type...
Hideo Joho, Joemon M. Jose