Sciweavers

3072 search results - page 439 / 615
» Shape analysis algorithm based on information theory
Sort
View
84
Voted
CCS
2005
ACM
15 years 3 months ago
Provable anonymity
This paper provides a formal framework for the analysis of information hiding properties of anonymous communication protocols in terms of epistemic logic. The key ingredient is ou...
Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Pe...
87
Voted
ADVIS
2004
Springer
15 years 3 months ago
Multiple Sets of Rules for Text Categorization
An important issue in text mining is how to make use of multiple pieces knowledge discovered to improve future decisions. In this paper, we propose a new approach to combining mult...
Yaxin Bi, Terry J. Anderson, Sally I. McClean
SIGDOC
2003
ACM
15 years 3 months ago
An interaction initiative model for documentation
In this paper we propose a model of creation and use of documentation based on the concept of mixed-initiative interaction. In our model, successful single-initiative interaction ...
David G. Novick, Karen Ward
HICSS
1999
IEEE
110views Biometrics» more  HICSS 1999»
15 years 2 months ago
Voting before Discussing: Computer Voting as Social Communication
This paper presents a case study on the use of an alternative method of computer support to that normally used, one that uses voting as a tool for social rather than rational choi...
Brian Whitworth, Robert J. McQueen
89
Voted
COMGEO
2010
ACM
15 years 1 months ago
Access control systems for spatial data infrastructures and their administration
Today sophisticated concepts, languages and frameworks exist, that allow implementing powerful fine grained access control systems for protecting Web Services and spatial data in ...
Jan Herrmann