Sciweavers

5954 search results - page 1133 / 1191
» Querying Bi-level Information
Sort
View
IDTRUST
2009
ACM
15 years 6 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
WSDM
2009
ACM
198views Data Mining» more  WSDM 2009»
15 years 6 months ago
Measuring the similarity between implicit semantic relations using web search engines
Measuring the similarity between implicit semantic relations is an important task in information retrieval and natural language processing. For example, consider the situation whe...
Danushka Bollegala, Yutaka Matsuo, Mitsuru Ishizuk...
WSDM
2009
ACM
161views Data Mining» more  WSDM 2009»
15 years 6 months ago
Predicting the readability of short web summaries
Readability is a crucial presentation attribute that web summarization algorithms consider while generating a querybaised web summary. Readability quality also forms an important ...
Tapas Kanungo, David Orr
EDBT
2009
ACM
218views Database» more  EDBT 2009»
15 years 6 months ago
Data integration flows for business intelligence
Business Intelligence (BI) refers to technologies, tools, and practices for collecting, integrating, analyzing, and presenting large volumes of information to enable better decisi...
Umeshwar Dayal, Malú Castellanos, Alkis Sim...
P2P
2009
IEEE
122views Communications» more  P2P 2009»
15 years 6 months ago
Virtual Direction Routing for Overlay Networks
The enormous interest for peer-to-peer systems in recent years has prompted research into finding scalable and robust seeding and searching methods to support these overlay netwo...
Bow-Nan Cheng, Murat Yuksel, Shivkumar Kalyanarama...
« Prev « First page 1133 / 1191 Last » Next »