Sciweavers

1708 search results - page 223 / 342
» A methodology to design information retrieval systems (MDIRS...
Sort
View
ACSAC
2002
IEEE
14 years 2 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
ERCIMDL
1997
Springer
169views Education» more  ERCIMDL 1997»
14 years 1 months ago
Relevance Feedback and Query Expansion for Searching the Web: A Model for Searching a Digital Library
: A fully operational large scale digital library is likely to be based on a distributed architecture and because of this it is likely that a number of independent search engines m...
Alan F. Smeaton, Francis Crimmins
MM
2003
ACM
120views Multimedia» more  MM 2003»
14 years 2 months ago
Linking multimedia presentations with their symbolic source documents: algorithm and applications
An algorithm is presented that automatically matches images of presentation slides to the symbolic source file (e.g., PowerPointTM or AcrobatTM ) from which they were generated. T...
Berna Erol, Jonathan J. Hull, Dar-Shyang Lee
CHI
2011
ACM
13 years 20 days ago
Apolo: making sense of large network data by combining rich user interaction and machine learning
Extracting useful knowledge from large network datasets has become a fundamental challenge in many domains, from scientific literature to social networks and the web. We introduc...
Duen Horng Chau, Aniket Kittur, Jason I. Hong, Chr...
SAC
2005
ACM
14 years 2 months ago
Discovering parametric clusters in social small-world graphs
We present a strategy for analyzing large, social small-world graphs, such as those formed by human networks. Our approach brings together ideas from a number of different resear...
Jonathan McPherson, Kwan-Liu Ma, Michael Ogawa