Sciweavers

1825 search results - page 339 / 365
» Personal Information Organization using Web Annotations
Sort
View
IDTRUST
2009
ACM
15 years 4 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
WSDM
2009
ACM
138views Data Mining» more  WSDM 2009»
15 years 4 months ago
Adaptive subjective triggers for opinionated document retrieval
This paper proposes a novel application of a statistical language model to opinionated document retrieval targeting weblogs (blogs). In particular, we explore the use of the trigg...
Kazuhiro Seki, Kuniaki Uehara
IMC
2009
ACM
15 years 4 months ago
Characterizing user behavior in online social networks
Understanding how users behave when they connect to social networking sites creates opportunities for better interface design, richer studies of social interactions, and improved ...
Fabrício Benevenuto, Tiago Rodrigues, Meeyo...
SAC
2010
ACM
14 years 10 months ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit
ISMIR
2005
Springer
206views Music» more  ISMIR 2005»
15 years 3 months ago
Improving Content-Based Similarity Measures by Training a Collaborative Model
We observed that for multimedia data – especially music - collaborative similarity measures perform much better than similarity measures derived from content-based sound feature...
Richard Stenzel, Thomas Kamps