Sciweavers

1629 search results - page 219 / 326
» A Study of Malcode-Bearing Documents
Sort
View
CIKM
2009
Springer
14 years 2 months ago
Evaluation of methods for relative comparison of retrieval systems based on clickthroughs
The Cranfield evaluation method has some disadvantages, including its high cost in labor and inadequacy for evaluating interactive retrieval techniques. As a very promising alter...
Jing He, Chengxiang Zhai, Xiaoming Li
MHCI
2009
Springer
14 years 2 months ago
Ubikequitous computing: designing interactive experiences for cyclists
This paper charts the distinctive challenges of designing mobile experiences for cyclists and presents two studies of mobile cyclebased experiences: one a heritage tour; the other...
Duncan Rowland, Martin Flintham, Leif Oppermann, J...
HT
2009
ACM
14 years 2 months ago
Weblog as a personal thinking space
While weblogs have been conceptualised as personal thinking spaces since their early days, those uses have not been studied in detail. The purpose of this paper is to explore how ...
Lilia Efimova
SIGCOMM
2009
ACM
14 years 2 months ago
A hierarchical model for BGP routing policies
BGP routing policies are mainly used by network operators to enforce business relationships between Autonomous Systems (AS), and to prefer some routes over others. In this paper, ...
Laurent Vanbever, Bruno Quoitin, Olivier Bonaventu...
CEC
2008
IEEE
14 years 2 months ago
Policy evolution with Genetic Programming: A comparison of three approaches
— In the early days a policy was a set of simple rules with a clear intuitive motivation that could be formalised to good effect. However the world is now much more complex. Subt...
Yow Tzu Lim, Pau-Chen Cheng, John Andrew Clark, Pa...