Sciweavers

73 search results - page 11 / 15
» bell 2006
Sort
View
JCS
2002
118views more  JCS 2002»
14 years 9 months ago
Verified Formal Security Models for Multiapplicative Smart Cards
We present two generic formal security models for operating systems of multiapplicative smart cards. The models formalize the main security aspects of secrecy, integrity, secure co...
Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, ...
CIKM
2006
Springer
15 years 1 months ago
Mining blog stories using community-based and temporal clustering
In recent years, weblogs, or blogs for short, have become an important form of online content. The personal nature of blogs, online interactions between bloggers, and the temporal...
Arun Qamra, Belle L. Tseng, Edward Y. Chang
SIGIR
2006
ACM
15 years 3 months ago
Personalized recommendation driven by information flow
We propose that the information access behavior of a group of people can be modeled as an information flow issue, in which people intentionally or unintentionally influence and in...
Xiaodan Song, Belle L. Tseng, Ching-Yung Lin, Ming...
DIAGRAMS
2006
Springer
15 years 1 months ago
Toward a Comprehensive Model of Graph Comprehension: Making the Case for Spatial Cognition
We argue that a comprehensive model of graph comprehension must include spatial cognition. We propose that current models of graph comprehension have not needed to incorporate spat...
Susan Bell Trickett, J. Gregory Trafton
AMAI
2006
Springer
14 years 9 months ago
A split-combination approach to merging knowledge bases in possibilistic logic
In this paper, we propose an adaptive approach to merging possibilistic knowledge bases that deploys multiple operators instead of a single operator in the merging process. The me...
Guilin Qi, Weiru Liu, David H. Glass, David A. Bel...