Sciweavers

10301 search results - page 1960 / 2061
» informs 2007
Sort
View
KDD
2007
ACM
176views Data Mining» more  KDD 2007»
16 years 1 months ago
Mining correlated bursty topic patterns from coordinated text streams
Previous work on text mining has almost exclusively focused on a single stream. However, we often have available multiple text streams indexed by the same set of time points (call...
Xuanhui Wang, ChengXiang Zhai, Xiao Hu, Richard Sp...
113
Voted
CHI
2007
ACM
16 years 1 months ago
Social practices in location-based collecting
The use of location-based technology to augment visitor experiences has received considerable attention over the years. In this paper, we take an alternative perspective on these ...
Kenton O'Hara, Tim Kindberg, Maxine Glancy, Lucian...
95
Voted
IEEEARES
2007
IEEE
15 years 7 months ago
Static evaluation of Certificate Policies for GRID PKIs interoperability
Validating an end-entity X.509 digital certificate prior to authorizing it for using a resource into the computational Grid has become a widely studied topic due to its importance...
Valentina Casola, Nicola Mazzocca, Jesus Luna, Osc...
92
Voted
INFOCOM
2007
IEEE
15 years 7 months ago
Availability in BitTorrent Systems
— In this paper, we investigate the problem of highly available, massive-scale file distribution in the Internet. To this end, we conduct a large-scale measurement study of BitT...
Giovanni Neglia, Giuseppe Reina, Honggang Zhang, D...
102
Voted
ICISS
2007
Springer
15 years 6 months ago
Security in Practice - Security-Usability Chasm
Abstract. Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge ...
Atul Prakash
« Prev « First page 1960 / 2061 Last » Next »