Sciweavers

471 search results - page 81 / 95
» An information systems auditor's profile
Sort
View
CIKM
2006
Springer
13 years 9 months ago
Voting for candidates: adapting data fusion techniques for an expert search task
In an expert search task, the users' need is to identify people who have relevant expertise to a topic of interest. An expert search system predicts and ranks the expertise o...
Craig Macdonald, Iadh Ounis
CCS
2008
ACM
13 years 9 months ago
Online subscriptions with anonymous access
Online privacy is an increasingly important problem, as many services are now offered in a digital form. Privacy (or the lack thereof) is of a special concern in subscriptions to ...
Marina Blanton
IUI
2009
ACM
14 years 4 months ago
Designing user interface adaptation rules with T: XML
The specification of model adaptation and generation rules is a topic of great interest for the user interface development community, since there are more and more approaches supp...
Víctor López-Jaquero, Francisco Mont...
SEMCO
2007
IEEE
14 years 1 months ago
Lexical and Discourse Analysis of Online Chat Dialog
One of the ultimate goals of natural language processing (NLP) systems is understanding the meaning of what is being transmitted, irrespective of the medium (e.g., written versus ...
Eric N. Forsythand, Craig H. Martell
EMS
2008
IEEE
13 years 9 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba