Sciweavers

264 search results - page 48 / 53
» Clustering of Search Engine Keywords Using Access Logs
Sort
View
CSE
2009
IEEE
14 years 5 months ago
Usable Privacy Controls for Blogs
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...
IUI
2004
ACM
14 years 3 months ago
SUPPLE: automatically generating user interfaces
In order to give people ubiquitous access to software applications, device controllers, and Internet services, it will be necessary to automatically adapt user interfaces to the c...
Krzysztof Gajos, Daniel S. Weld
AVI
2004
13 years 11 months ago
Sketch-based retrieval of ClipArt drawings
These days there are a lot of vector drawings available for people to integrate into documents. These come in a variety of formats, such as Corel, Postscript, CGM, WMF and recentl...
Manuel J. Fonseca, Bruno Barroso, Pedro Ribeiro, J...
HICSS
2003
IEEE
186views Biometrics» more  HICSS 2003»
14 years 3 months ago
Personalization through Mask Marketing
Customized marketing, so called 1-to-1 marketing, is often viewed as the panacea of e-commerce. User profiles, such as click streams logging every site the user accesses, are expl...
Moritz Strasser, Alf Zugenmaier
CIKM
2004
Springer
14 years 3 months ago
Local methods for estimating pagerank values
The Google search engine uses a method called PageRank, together with term-based and other ranking techniques, to order search results returned to the user. PageRank uses link ana...
Yen-Yu Chen, Qingqing Gan, Torsten Suel