Sciweavers

14285 search results - page 2652 / 2857
» Web Based Management
Sort
View
151
Voted
ICTAI
2009
IEEE
15 years 11 months ago
Preventing Unwanted Social Inferences with Classification Tree Analysis
A serious threat to user privacy in new mobile and web2.0 applications stems from ‘social inferences’. These unwanted inferences are related to the users’ identity, current ...
Sara Motahari, Sotirios G. Ziavras, Quentin Jones
ACISP
2009
Springer
15 years 11 months ago
Towards Denial-of-Service-Resilient Key Agreement Protocols
Denial of service resilience is an important practical consideration for key agreement protocols in any hostile environment such as the Internet. There are well-known models that ...
Douglas Stebila, Berkant Ustaoglu
WINE
2009
Springer
202views Economy» more  WINE 2009»
15 years 11 months ago
A New Ranking Scheme of the GSP Mechanism with Markovian Users
Sponsored search auction is used by most search engines to select ads to display on the web page of a search result, according to advertisers’ bidding prices. The income of this ...
Xiaotie Deng, Jiajin Yu
CIKM
2009
Springer
15 years 11 months ago
Beyond hyperlinks: organizing information footprints in search logs to support effective browsing
While current search engines serve known-item search such as homepage finding very well, they generally cannot support exploratory search effectively. In exploratory search, user...
Xuanhui Wang, Bin Tan, Azadeh Shakery, ChengXiang ...
ERCIMDL
2009
Springer
139views Education» more  ERCIMDL 2009»
15 years 11 months ago
Geographic Information Retrieval and Digital Libraries
In this demonstration we will examine the effectiveness of Geographic Information Retrieval (GIR) methods in digital library interfaces. We will show how various types of informat...
Ray R. Larson
« Prev « First page 2652 / 2857 Last » Next »