Sciweavers

701 search results - page 12 / 141
» Comments on
Sort
View
SEC
1993
13 years 11 months ago
Teaching Computer Security
This paper describes three courses in computer security, and offers come comments about their appropriateness, their advantages and their disadvantages.
Matt Bishop
SIGIR
2008
ACM
13 years 9 months ago
Comments-oriented document summarization: understanding documents with readers' feedback
Comments left by readers on Web documents contain valuable information that can be utilized in different information retrieval tasks including document search, visualization, and ...
Meishan Hu, Aixin Sun, Ee-Peng Lim
ACL
2010
13 years 7 months ago
Recommendation in Internet Forums and Blogs
The variety of engaging interactions among users in social medial distinguishes it from traditional Web media. Such a feature should be utilized while attempting to provide intell...
Jia Wang, Qing Li, Yuanzhu Peter Chen, Zhangxi Lin
WWW
2010
ACM
14 years 4 months ago
Shout out: integrating news and reader comments
A useful approach for enabling computers to automatically create new content is utilizing the text, media, and information already present on the World Wide Web. The newly created...
Lisa M. Gandy, Nathan D. Nichols, Kristian J. Hamm...
ICSE
2009
IEEE-ACM
14 years 4 months ago
The comment density of open source software code
Oliver Arafat, Dirk Riehle