Sciweavers

2817 search results - page 552 / 564
» A Framework for the Management of Information Security
Sort
View
WWW
2005
ACM
14 years 9 months ago
AVATAR: an approach based on semantic reasoning to recommend personalized TV programs
In this paper a TV recommender system called AVATAR (AdVAnce Telematic search of Audiovisual contents by semantic Reasoning) is presented. This tool uses the experience gained in ...
Yolanda Blanco-Fernández, José J. Pa...
WWW
2003
ACM
14 years 9 months ago
Haystack: A Platform for Authoring End User Semantic Web Applications
The Semantic Web promises to open innumerable opportunities for automation and information retrieval by standardizing the protocols for metadata exchange. However, just as the succ...
Dennis Quan, David Huynh, David R. Karger
KDD
2008
ACM
211views Data Mining» more  KDD 2008»
14 years 9 months ago
ArnetMiner: extraction and mining of academic social networks
This paper addresses several key issues in the ArnetMiner system, which aims at extracting and mining academic social networks. Specifically, the system focuses on: 1) Extracting ...
Jie Tang, Jing Zhang, Limin Yao, Juanzi Li, Li Zha...
ATAL
2009
Springer
14 years 3 months ago
Real-time expressive gaze animation for virtual humans
Gaze is an extremely important aspect of human face to face interaction. Over the course of an interaction, a single individual’s gaze can perform many different functions, such...
Marcus Thiébaux, Brent Lance, Stacy Marsell...
CISS
2008
IEEE
14 years 3 months ago
Peer-to-Peer utility maximization
—In this paper, we study the problem of utility maximization in Peer-to-Peer (P2P) systems, in which aggregate utilities are maximized by running distributed algorithms on P2P no...
Minghua Chen, Sudipta Sengupta, Miroslav Ponec, Ph...