Sciweavers

511 search results - page 17 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
137
Voted
LWA
2008
15 years 5 months ago
Enhanced Services for Targeted Information Retrieval by Event Extraction and Data Mining
Where Information Retrieval (IR) and Text Categorization delivers a set of (ranked) documents according to a query, users of large document collections would rather like to receiv...
Felix Jungermann, Katharina Morik
134
Voted
IIR
2010
15 years 5 months ago
A Study on Evaluation on Opinion Retrieval Systems
We study the evaluation of opinion retrieval systems. Opinion retrieval is a relatively new research area, nevertheless classical evaluation measures, those adopted for ad hoc ret...
Giambattista Amati, Giuseppe Amodeo, Valerio Capoz...
126
Voted
CLEF
2006
Springer
15 years 7 months ago
CLEF 2006: Ad Hoc Track Overview
We describe the objectives and organization of the CLEF 2006 ad hoc track and discuss the main characteristics of the tasks offered to test monolingual, bilingual, and multilingual...
Giorgio Maria Di Nunzio, Nicola Ferro, Thomas Mand...
143
Voted
CCS
2009
ACM
16 years 4 months ago
A conceptual framework for Group-Centric secure information sharing
In this paper, we propose a conceptual framework for developing a family of models for Group-Centric information sharing. The traditional approach to information sharing, characte...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
182
Voted
ADHOCNOW
2004
Springer
15 years 9 months ago
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks
Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threat...
Mike Burmester, Tri Van Le, Alec Yasinsac