Sciweavers

8381 search results - page 1599 / 1677
» The security of machine learning
Sort
View
ASSETS
2004
ACM
15 years 6 months ago
A web accessibility service: update and findings
We report here on our progress on a project first described at the ASSETS 2002 conference. At that time, we had developed a prototype system in which a proxy server intermediary w...
Vicki L. Hanson, John T. Richards
91
Voted
JCDL
2004
ACM
128views Education» more  JCDL 2004»
15 years 6 months ago
Panorama: extending digital libraries with topical crawlers
A large amount of research, technical and professional documents are available today in digital formats. Digital libraries are created to facilitate search and retrieval of inform...
Gautam Pant, Kostas Tsioutsiouliklis, Judy Johnson...
105
Voted
WOSS
2004
ACM
15 years 6 months ago
Combining statistical monitoring and predictable recovery for self-management
Complex distributed Internet services form the basis not only of e-commerce but increasingly of mission-critical networkbased applications. What is new is that the workload and in...
Armando Fox, Emre Kiciman, David A. Patterson
EDBT
2009
ACM
277views Database» more  EDBT 2009»
15 years 5 months ago
G-hash: towards fast kernel-based similarity search in large graph databases
Structured data including sets, sequences, trees and graphs, pose significant challenges to fundamental aspects of data management such as efficient storage, indexing, and simila...
Xiaohong Wang, Aaron M. Smalter, Jun Huan, Gerald ...
108
Voted
CIKM
2009
Springer
15 years 4 months ago
Blogger-centric contextual advertising
This paper addresses the concept of Blogger-Centric Contextual Advertising, which refers to the assignment of personal ads to any blog page, chosen in according to bloggers' ...
Teng-Kai Fan, Chia-Hui Chang
« Prev « First page 1599 / 1677 Last » Next »