Sciweavers

511 search results - page 42 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
CIKM
2008
Springer
15 years 5 months ago
To swing or not to swing: learning when (not) to advertise
Web textual advertising can be interpreted as a search problem over the corpus of ads available for display in a particular context. In contrast to conventional information retrie...
Andrei Z. Broder, Massimiliano Ciaramita, Marcus F...
122
Voted
IWIC
2007
Springer
15 years 10 months ago
Culturally-Situated Pictogram Retrieval
Abstract. This paper studies the patterns of cultural differences observed in pictogram interpretation. We conducted a 14-month online survey in the U.S. and Japan to ask the mean...
Heeryon Cho, Toru Ishida, Naomi Yamashita, Rieko I...
ESOP
2005
Springer
15 years 9 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
SAC
2005
ACM
15 years 9 months ago
Privacy preserving learning in negotiation
Machine learning techniques are widely used in negotiation systems. To get more accurate and satisfactory learning results, negotiation parties have the desire to employ learning ...
Sheng Zhang, Fillia Makedon
INEX
2004
Springer
15 years 9 months ago
Hybrid XML Retrieval Revisited
Abstract. The widespread adoption of XML necessitates structureaware systems that can effectively retrieve information from XML document collections. This paper reports on the par...
Jovan Pehcevski, James A. Thom, Seyed M. M. Tahagh...