Sciweavers

8724 search results - page 1566 / 1745
» Search result diversification
Sort
View
CCS
2008
ACM
15 years 2 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
115
Voted
MMM
2010
Springer
141views Multimedia» more  MMM 2010»
15 years 2 months ago
Slow Intelligence Systems
: Networks and distributed computing systems are becoming increasingly important and at the same time, more and more critical to the world of Information Technology. This rash spre...
Shi-Kuo Chang
CIKM
2008
Springer
15 years 2 months ago
A consensus based approach to constrained clustering of software requirements
Managing large-scale software projects involves a number of activities such as viewpoint extraction, feature detection, and requirements management, all of which require a human a...
Chuan Duan, Jane Cleland-Huang, Bamshad Mobasher
125
Voted
CLEF
2008
Springer
15 years 2 months ago
Overview of WebCLEF 2008
We describe the WebCLEF 2008 task. Similarly to the 2007 edition of WebCLEF, the 2008 edition implements a multilingual "information synthesis" task, where, for a given t...
Valentin Jijkoun, Maarten de Rijke
86
Voted
CLEF
2008
Springer
15 years 2 months ago
Overview of the Clef 2008 Multilingual Question Answering Track
The QA campaign at CLEF [1], was manly the same as that proposed last year. The results and the analyses reported by last year's participants suggested that the changes introd...
Pamela Forner, Anselmo Peñas, Eneko Agirre,...
« Prev « First page 1566 / 1745 Last » Next »