Sciweavers

8468 search results - page 1612 / 1694
» The Technology of Data Stashing
Sort
View
CCS
2007
ACM
15 years 4 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
CIKM
2007
Springer
15 years 4 months ago
Predictive user click models based on click-through history
Web search engines consistently collect information about users interaction with the system: they record the query they issued, the URL of presented and selected documents along w...
Benjamin Piwowarski, Hugo Zaragoza
CIKM
2007
Springer
15 years 4 months ago
Improving the classification of newsgroup messages through social network analysis
Newsgroup participants interact with their communities through conversation threads. They may respond to a message to answer a question, debate a topic, support or disagree with a...
Blaz Fortuna, Eduarda Mendes Rodrigues, Natasa Mil...
CLEF
2007
Springer
15 years 4 months ago
Cross-Lingual Information Retrieval System for Indian Languages
This paper describes our first participation in the Indian language sub-task of the main Adhoc monolingual and bilingual track in CLEF1 competition. In this track, the task is to...
Jagadeesh Jagarlamudi, A. Kumaran
CLEF
2007
Springer
15 years 4 months ago
MIRACLE at ImageCLEFanot 2007: Machine Learning Experiments on Medical Image Annotation
This paper describes the participation of MIRACLE research consortium at the ImageCLEF Medical Image Annotation task of ImageCLEF 2007. Our areas of expertise do not include image...
Sara Lana-Serrano, Julio Villena-Román, Jos...
« Prev « First page 1612 / 1694 Last » Next »