Sciweavers

81 search results - page 13 / 17
» Toward a threat model for storage systems
Sort
View
JCDL
2009
ACM
139views Education» more  JCDL 2009»
15 years 4 months ago
Topic model methods for automatically identifying out-of-scope resources
Recent years have seen the rise of subject-themed digital libraries, such as the NSDL pathways and the Digital Library for Earth System Education (DLESE). These libraries often ne...
Steven Bethard, Soumya Ghosh, James H. Martin, Tam...
CIKM
2008
Springer
14 years 11 months ago
Improve the effectiveness of the opinion retrieval and opinion polarity classification
Opinion retrieval is a document retrieving and ranking process. A relevant document must be relevant to the query and contain opinions toward the query. Opinion polarity classific...
Wei Zhang, Lifeng Jia, Clement T. Yu, Weiyi Meng
IUI
2005
ACM
15 years 3 months ago
Task aware information access for diagnosis of manufacturing problems
Pinpoint is a promising first step towards using a rich model of task context in proactive and dynamic IR systems. Pinpoint allows a user to navigate decision tree representations...
Larry Birnbaum, Wallace J. Hopp, Seyed M. R. Irava...
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
15 years 1 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
CIVR
2009
Springer
151views Image Analysis» more  CIVR 2009»
15 years 4 months ago
Reusing annotation labor for concept selection
Describing shots through the occurrence of semantic concepts is the first step towards modeling the content of a video semantically. An important challenge is to automatically se...
Robin Aly, Djoerd Hiemstra, Arjen P. de Vries