Sciweavers

1708 search results - page 197 / 342
» A methodology to design information retrieval systems (MDIRS...
Sort
View
CCS
2011
ACM
12 years 10 months ago
SURF: detecting and measuring search poisoning
Search engine optimization (SEO) techniques are often abused to promote websites among search results. This is a practice known as blackhat SEO. In this paper we tackle a newly em...
Long Lu, Roberto Perdisci, Wenke Lee
CCS
2011
ACM
12 years 10 months ago
Practical PIR for electronic commerce
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Ryan Henry, Femi G. Olumofin, Ian Goldberg
MIR
2004
ACM
101views Multimedia» more  MIR 2004»
14 years 3 months ago
Leveraging face recognition technology to find and organize photos
With digital still cameras, users can easily collect thousands of photos. We have created a photo management application with the goal of making photo organization and browsing si...
Andreas Girgensohn, John Adcock, Lynn Wilcox
JCDL
2006
ACM
141views Education» more  JCDL 2006»
14 years 4 months ago
An architecture for the aggregation and analysis of scholarly usage data
Although recording of usage data is common in scholarly information services, its exploitation for the creation of valueadded services remains limited due to concerns regarding, a...
Johan Bollen, Herbert Van de Sompel
WWW
2008
ACM
14 years 11 months ago
Mashups for semantic user profiles
In this paper, we discuss challenges and provide solutions for capturing and maintaining accurate models of user profiles using semantic web technologies, by aggregating and shari...
Riddhiman Ghosh, Mohamed Dekhil