Sciweavers

5326 search results - page 46 / 1066
» On what we can ensure
Sort
View
WSC
1998
15 years 1 months ago
So You Have Your Model: What to Do Next. A Tutorial on Simulation Output Analysis
Simulation models are built with the intent of studying the behavior of the real system represented by the model. However, a simulation model generates random outputs; thus, the d...
Martha A. Centeno, M. Florencia Reyes
108
Voted
SIGIR
2006
ACM
15 years 6 months ago
You are what you say: privacy risks of public mentions
In today’s data-rich networked world, people express many aspects of their lives online. It is common to segregate different aspects in different places: you might write opinion...
Dan Frankowski, Dan Cosley, Shilad Sen, Loren G. T...
133
Voted
IPM
2007
139views more  IPM 2007»
15 years 14 days ago
"What is a good digital library?" - A quality model for digital libraries
In this article, we elaborate on the meaning of quality in digital libraries (DLs) by proposing a model that is deeply grounded in a formal framework for digital libraries: 5S (St...
Marcos André Gonçalves, Bárba...
108
Voted
PRICAI
2000
Springer
15 years 4 months ago
Task Models, Intentions, and Agent Conversation Policies
It is possible to define conversation policies, such as communication or dialogue protocols, that are based strictly on what messages and, respectively, what performatives may foll...
Renee Elio, Afsaneh Haddadi, Ajit Singh
98
Voted
CIKM
2007
Springer
15 years 6 months ago
"I know what you did last summer": query logs and user privacy
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers ...
Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins