Sciweavers

142 search results - page 25 / 29
» Towards Topic Following in Heterogeneous Information Network...
Sort
View
SUTC
2008
IEEE
15 years 4 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
COMCOM
2007
82views more  COMCOM 2007»
14 years 10 months ago
On application-level load balancing in FastReplica
— In the paper, we consider the problem of distributing large-size content to a fixed set of nodes. In contrast with the most existing end-system solutions to this problem, Fast...
Jangwon Lee, Gustavo de Veciana
CHI
1994
ACM
15 years 2 months ago
What HCI designers can learn from video game designers
Computer users have tasks they need to perform, and are therefore motivated to overcome poorly designed interfaces. With video games, there is no external motivation for the task ...
Randy Pausch, Rich Gold, Tim Skelly, David Thiel
CHI
2011
ACM
14 years 1 months ago
Enhancing credibility judgment of web search results
In this paper, we propose a system for helping users to judge the credibility of Web search results and to search for credible Web pages. Conventional Web search engines present o...
Yusuke Yamamoto, Katsumi Tanaka
ESANN
2004
14 years 11 months ago
Neural networks for data mining: constrains and open problems
When we talk about using neural networks for data mining we have in mind the original data mining scope and challenge. How did neural networks meet this challenge? Can we run neura...
Razvan Andonie, Boris Kovalerchuk