Sciweavers

1982 search results - page 293 / 397
» Parametricity and dependent types
Sort
View
CCS
2000
ACM
15 years 2 months ago
Timing attacks on Web privacy
We describe a class of attacks that can compromise the privacy of users’ Web-browsing histories. The attacks allow a malicious Web site to determine whether or not the user has ...
Edward W. Felten, Michael A. Schneider
CIKM
2000
Springer
15 years 2 months ago
A Semi-Supervised Document Clustering Technique for Information Organization
This paper discusses a new type of semi-supervised document clustering that uses partial supervision to partition a large set of documents. Most clustering methods organizes docum...
Han-joon Kim, Sang-goo Lee
IUI
1999
ACM
15 years 2 months ago
Evaluating Adaptive Navigation Support
From the few evaluations of adaptive navigation systems that have been performed, we see an emerging pattern where depending upon the domain, only certain types of adaptive naviga...
Kristina Höök, Martin Svensson
CIKM
1999
Springer
15 years 2 months ago
A Method of Geographical Name Extraction from Japanese Text for Thematic Geographical Search
A text retrieval method called the thematic geographical search method has been developed and applied to a Japanese encyclopedia called the World Encyclopædia. In this method, th...
Yasusi Kanada
LCN
1999
IEEE
15 years 2 months ago
Periodic Route Optimization for Handed-Off Connections in Wireless ATM Networks
In Wireless ATM networks, user connections need to be rerouted during handoff as mobile users move among base stations. The rerouting of connections must be done quickly with mini...
Khaled Salah, Elias Drakopoulos, Tzilla Elrad