Sciweavers

3334 search results - page 453 / 667
» Using User Models in Music Information Retrieval Systems
Sort
View
132
Voted
ECBS
2002
IEEE
114views Hardware» more  ECBS 2002»
15 years 10 months ago
An Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....
181
Voted
SOCIALCOM
2010
15 years 2 months ago
Opinion Summarization in Bengali: A Theme Network Model
Theme network is a semantic network of document specific themes. So far Natural Language Processing (NLP) research patronized much of topic based summarizer system, unable to captu...
Amitava Das, Sivaji Bandyopadhyay
CLEF
2007
Springer
15 years 11 months ago
Stemming Approaches for East European Languages
In our participation in this CLEF evaluation campaign, the first objective is to propose and evaluate various indexing and search strategies for the Czech language in order to hop...
Ljiljana Dolamic, Jacques Savoy
155
Voted
WWW
2008
ACM
16 years 5 months ago
Online learning from click data for sponsored search
Sponsored search is one of the enabling technologies for today's Web search engines. It corresponds to matching and showing ads related to the user query on the search engine...
Massimiliano Ciaramita, Vanessa Murdock, Vassilis ...
SACMAT
2010
ACM
15 years 3 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino