Sciweavers

922 search results - page 178 / 185
» Controllability and Observability of Second Order Descriptor...
Sort
View
WWW
2009
ACM
14 years 8 months ago
All your contacts are belong to us: automated identity theft attacks on social networks
Social networking sites have been increasingly gaining popularity. Well-known sites such as Facebook have been reporting growth rates as high as 3% per week [5]. Many social netwo...
Leyla Bilge, Thorsten Strufe, Davide Balzarotti, E...
SIGMOD
2008
ACM
103views Database» more  SIGMOD 2008»
14 years 8 months ago
XArch: archiving scientific and reference data
Database archiving is important for the retrieval of old versions of a database and for temporal queries over the history of data. We demonstrate XArch, a management system for ma...
Heiko Müller, Ioannis Koltsidas, Peter Bunema...
WWW
2010
ACM
14 years 2 months ago
Statistical models of music-listening sessions in social media
User experience in social media involves rich interactions with the media content and other participants in the community. In order to support such communities, it is important to...
Elena Zheleva, John Guiver, Eduarda Mendes Rodrigu...
CLEF
2007
Springer
14 years 2 months ago
Domain-Specific IR for German, English and Russian Languages
In participating in this CLEF evaluation campaign, our first objective is to propose and evaluate various indexing and search strategies for the Russian language, in order to obta...
Claire Fautsch, Ljiljana Dolamic, Samir Abdou, Jac...
CLEF
2007
Springer
14 years 2 months ago
Stemming Approaches for East European Languages
In our participation in this CLEF evaluation campaign, the first objective is to propose and evaluate various indexing and search strategies for the Czech language in order to hop...
Ljiljana Dolamic, Jacques Savoy