Sciweavers

1898 search results - page 154 / 380
» About the art in this issue
Sort
View
CIKM
2000
Springer
14 years 2 months ago
Creating and Evaluating Multi-Document Sentence Extract Summaries
This paper discusses passage extraction approaches to multidocument summarization that use available information about the document set as a whole and the relationships between th...
Jade Goldstein, Vibhu O. Mittal, Jaime G. Carbonel...
WECWIS
1999
IEEE
111views ECommerce» more  WECWIS 1999»
14 years 1 months ago
A Quantitative Analysis of the User Behavior of a Large E-Broker
The Internet and the World Wide Web provide a global virtual marketplace. However, there is little information about the behavior of e-commerce users worldwide. The goal of the pa...
Virgilio Almeida, Wagner Meira Jr., Victor F. Ribe...
KDD
1998
ACM
94views Data Mining» more  KDD 1998»
14 years 1 months ago
Independence Diagrams: A Technique for Visual Data Mining
An important issue in data mining is the recognition of complex dependencies between attributes. Past techniques for identifying attribute dependence include correlation coefficie...
Stefan Berchtold, H. V. Jagadish, Kenneth A. Ross
CSFW
2010
IEEE
14 years 1 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma
SP
2010
IEEE
157views Security Privacy» more  SP 2010»
14 years 1 months ago
Bootstrapping Trust in Commodity Computers
Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer’s state. We examine research ...
Bryan Parno, Jonathan M. McCune, Adrian Perrig