Sciweavers

1310 search results - page 120 / 262
» Modelling and Using Imperfect Context Information
Sort
View
CCS
2006
ACM
15 years 1 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
CHI
2005
ACM
15 years 10 months ago
A study on the use of semaphoric gestures to support secondary task interactions
We present results of a study that considers (a) gestures outside the context of a specific implementation and (b) their use in supporting secondary, rather than primary tasks in ...
Maria Karam, Monica M. C. Schraefel
ICPR
2010
IEEE
14 years 8 months ago
Word Clustering Using PLSA Enhanced with Long Distance Bigrams
Probabilistic latent semantic analysis is enhanced with long distance bigram models in order to improve word clustering. The long distance bigram probabilities and the interpolate...
Nikoletta Bassiou, Constantine Kotropoulos
SIGIR
2006
ACM
15 years 3 months ago
User modeling for full-text federated search in peer-to-peer networks
User modeling for information retrieval has mostly been studied to improve the effectiveness of information access in centralized repositories. In this paper we explore user model...
Jie Lu, James P. Callan
ECIR
2006
Springer
14 years 11 months ago
A Comparative Study of the Effectiveness of Search Result Presentation on the Web
Presentation of search results in Web-based information retrieval (IR) systems has been dominated by a textual form of information such as the title, snippet, URL, and/or file type...
Hideo Joho, Joemon M. Jose