Sciweavers

1471 search results - page 248 / 295
» Word Importance Discrimination Using Context Information
Sort
View
CHI
2004
ACM
16 years 4 months ago
Transcendent communication: location-based guidance for large-scale public spaces
Many studies have been conducted on supporting communication in home and office spaces, but relatively few studies have explored supporting communication in large-scale public spa...
Hideyuki Nakanishi, Satoshi Koizumi, Toru Ishida, ...
HICSS
2006
IEEE
146views Biometrics» more  HICSS 2006»
15 years 10 months ago
Contextual e-Negotiation for the Handling of Private Data in e-Commerce on a Semantic Web
In this paper, we describe data support in an information system to support contextual, online negotiation of privacy contracts for e-commerce on the Semantic Web. Context is impo...
Yingxin (Sheila) He, Dawn N. Jutla
ICDCSW
2005
IEEE
15 years 10 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani
EUROSEC
2010
ACM
15 years 9 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
HT
2010
ACM
15 years 9 months ago
Conversational tagging in twitter
Users on Twitter, a microblogging service, started the phenomenon of adding tags to their messages sometime around February 2008. These tags are distinct from those in other Web 2...
Jeff Huang, Katherine M. Thornton, Efthimis N. Eft...