Sciweavers

7285 search results - page 1369 / 1457
» On Challenges for Information Management Technology
Sort
View
FC
2007
Springer
122views Cryptology» more  FC 2007»
15 years 4 months ago
Mental Models of Security Risks
1 2 There is a critical need in computer security to communicate risks and thereby enable informed decisions by naive users. Yet computer security has not been engaged with the sc...
Farzaneh Asgharpour, Debin Liu, L. Jean Camp
IWIC
2007
Springer
15 years 4 months ago
Collaborative Platform for Multilingual Resource Development and Intercultural Communication
The Internet has already connected people and established a mature online community. The use of WWW is also in the main stream of disseminating one’s information and services. In...
Virach Sornlertlamvanich, Thatsanee Charoenporn, K...
CIKM
2005
Springer
15 years 3 months ago
MailRank: using ranking for spam detection
Can we use social networks to combat spam? This paper investigates the feasibility of MailRank, a new email ranking and classification scheme exploiting the social communication ...
Paul-Alexandru Chirita, Jörg Diederich, Wolfg...
CIKM
2004
Springer
15 years 3 months ago
Hierarchical document categorization with support vector machines
Automatically categorizing documents into pre-defined topic hierarchies or taxonomies is a crucial step in knowledge and content management. Standard machine learning techniques ...
Lijuan Cai, Thomas Hofmann
INEX
2004
Springer
15 years 3 months ago
If INEX Is the Answer, What Is the Question?
The INEX query languages allow the extraction of fragments from selected documents. This power is not much used in INEX queries. The paper suggests reasons why, and considers which...
Richard A. O'Keefe
« Prev « First page 1369 / 1457 Last » Next »