Sciweavers

1505 search results - page 211 / 301
» Boosting the Availability of Information Systems by Data Rep...
Sort
View
MM
2005
ACM
158views Multimedia» more  MM 2005»
14 years 2 months ago
Semantic knowledge extraction and annotation for web images
Nowadays, images have become widely available on the World Wide Web (WWW). It’s essential to develop effective ways for managing and retrieving such abundant images. Advantageou...
Zhigang Hua, Xiang-Jun Wang, Qingshan Liu, Hanqing...
SIGIR
2005
ACM
14 years 2 months ago
Automated evaluation of search engine performance via implicit user feedback
Measuring the information retrieval effectiveness of Web search engines can be expensive if human relevance judgments are required to evaluate search results. Using implicit user ...
Himanshu Sharma, Bernard J. Jansen
AWIC
2004
Springer
14 years 23 days ago
Attribute Reduction for Effective Intrusion Detection
Abstract. Computer intrusion detection is to do with identifying computer activities that may compromise the integrity, confidentiality or the availability of an IT system. Anomaly...
Fernando Godínez, Dieter Hutter, Raul Monro...
ETRICS
2006
14 years 20 days ago
Policy-Based Integration of User and Provider-Sided Identity Management
Abstract. Depending on whether the users or the providers are performing it, Identity Management (IM) traditionally has different meanings. For users, IM means to choose between on...
Wolfgang Hommel
LREC
2010
147views Education» more  LREC 2010»
13 years 10 months ago
Speaker Attribution in Cabinet Protocols
Historical cabinet protocols are a useful resource which enable historians to identify the opinions expressed by politicians on different subjects and at different points of time....
Josef Ruppenhofer, Caroline Sporleder, Fabian Shir...