Sciweavers

515 search results - page 51 / 103
» A Strategy for Information Source Identification
Sort
View
116
Voted
CISS
2007
IEEE
15 years 10 months ago
Detecting Malicious Behavior in Cooperative Diversity
—We consider a cooperative diversity scheme where a relay cooperatively enhances communication between a source and destination. In cooperative diversity, due to lack of a mechan...
Sintayehu Dehnie, Husrev T. Sencar, Nasir D. Memon
CHI
2007
ACM
16 years 4 months ago
Pictures at the ATM: exploring the usability of multiple graphical passwords
Users gain access to cash, confidential information and services at Automated Teller Machines (ATMs) via an authentication process involving a Personal Identification Number (PIN)...
Wendy Moncur, Grégory Leplâtre
115
Voted
IPM
2008
90views more  IPM 2008»
15 years 3 months ago
Interactive high-quality text classification
Automatic text classification (TC) is essential for information sharing and management. Its ideal goals are to achieve high-quality TC: (1) accepting almost all documents that sho...
Rey-Long Liu
114
Voted
SEMWEB
2004
Springer
15 years 9 months ago
An Initial Investigation into Querying an Untrustworthy and Inconsistent Web
The Semantic Web is bound to be untrustworthy and inconsistent. In this paper, we present an initial approach for obtaining useful information in such an environment. In particular...
Yuanbo Guo, Jeff Heflin
ICDE
2007
IEEE
99views Database» more  ICDE 2007»
16 years 4 months ago
Source-aware Entity Matching: A Compositional Approach
Entity matching (a.k.a. record linkage) plays a crucial role in integrating multiple data sources, and numerous matching solutions have been developed. However, the solutions have...
Warren Shen, Pedro DeRose, Long Vu, AnHai Doan, Ra...