Sciweavers

701 search results - page 12 / 141
» Comments on
Sort
View
118
Voted
SEC
1993
15 years 4 months ago
Teaching Computer Security
This paper describes three courses in computer security, and offers come comments about their appropriateness, their advantages and their disadvantages.
Matt Bishop
SIGIR
2008
ACM
15 years 3 months ago
Comments-oriented document summarization: understanding documents with readers' feedback
Comments left by readers on Web documents contain valuable information that can be utilized in different information retrieval tasks including document search, visualization, and ...
Meishan Hu, Aixin Sun, Ee-Peng Lim
124
Voted
ACL
2010
15 years 1 months ago
Recommendation in Internet Forums and Blogs
The variety of engaging interactions among users in social medial distinguishes it from traditional Web media. Such a feature should be utilized while attempting to provide intell...
Jia Wang, Qing Li, Yuanzhu Peter Chen, Zhangxi Lin
115
Voted
WWW
2010
ACM
15 years 10 months ago
Shout out: integrating news and reader comments
A useful approach for enabling computers to automatically create new content is utilizing the text, media, and information already present on the World Wide Web. The newly created...
Lisa M. Gandy, Nathan D. Nichols, Kristian J. Hamm...
ICSE
2009
IEEE-ACM
15 years 10 months ago
The comment density of open source software code
Oliver Arafat, Dirk Riehle