Sciweavers

3193 search results - page 603 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
WSDM
2010
ACM
194views Data Mining» more  WSDM 2010»
14 years 5 months ago
Ranking with Query-Dependent Loss for Web Search
Queries describe the users' search intent and therefore they play an essential role in the context of ranking for information retrieval and Web search. However, most of exist...
Jiang Bian, Tie-Yan Liu, Tao Qin, Hongyuan Zha
IUI
2006
ACM
14 years 1 months ago
Towards intelligent QA interfaces: discourse processing for context questions
Question answering (QA) systems take users’ natural language questions and retrieve relevant answers from large repositories of free texts. Despite recent progress in QA researc...
Mingyu Sun, Joyce Y. Chai
ISMB
1997
13 years 9 months ago
Standardized Representations of the Literature: Combining Diverse Sources of Ribosomal Data
We are building a knowledge base (KB) of published structural data on the 30s ribosomal subunit in prokaryotes. Our KB is distinguished by a standardized representation of biologi...
Russ B. Altman, Neil F. Abernethy, Richard O. Chen
GAMESEC
2011
287views Game Theory» more  GAMESEC 2011»
12 years 7 months ago
Collaborative Location Privacy with Rational Users
Recent smartphones incorporate embedded GPS devices that enable users to obtain geographic information about their surroundings by providing a location-based service (LBS) with the...
Francisco Santos, Mathias Humbert, Reza Shokri, Je...
ICIP
2002
IEEE
14 years 9 months ago
Optimal recursive similarity measure estimation for interactive content-based image retrieval
In this paper, a new recursive algorithm is proposed for optimal estimation of similarity measure used in a content-based retrieval system. This is performed through a relevance f...
Anastasios D. Doulamis, Nikolaos D. Doulamis