Sciweavers

8243 search results - page 1568 / 1649
» Can We Manage Trust
Sort
View
SIGIR
2010
ACM
14 years 21 days ago
Proximity-based opinion retrieval
Blog post opinion retrieval aims at finding blog posts that are relevant and opinionated about a user’s query. In this paper we propose a simple probabilistic model for assigni...
Shima Gerani, Mark James Carman, Fabio Crestani
SIGMOD
2010
ACM
215views Database» more  SIGMOD 2010»
14 years 21 days ago
Dynamic symbolic database application testing
A database application differs form regular applications in that some of its inputs may be database queries. The program will execute the queries on a database and may use any re...
Chengkai Li, Christoph Csallner
GIS
2009
ACM
14 years 21 days ago
Classification of raster maps for automatic feature extraction
Raster maps are widely available and contain useful geographic features such as labels and road lines. To extract the geographic features, most research work relies on a manual st...
Yao-Yi Chiang, Craig A. Knoblock
ACSAC
2004
IEEE
14 years 17 days ago
Security Policies to Mitigate Insider Threat in the Document Control Domain
With rapid advances in online technologies, organizations are migrating from paper based resources to digital documents to achieve high responsiveness and ease of management. Thes...
Suranjan Pramanik, Vidyaraman Sankaranarayanan, Sh...
ASPLOS
2006
ACM
14 years 17 days ago
Comprehensively and efficiently protecting the heap
The goal of this paper is to propose a scheme that provides comprehensive security protection for the heap. Heap vulnerabilities are increasingly being exploited for attacks on co...
Mazen Kharbutli, Xiaowei Jiang, Yan Solihin, Guru ...
« Prev « First page 1568 / 1649 Last » Next »