Sciweavers

8746 search results - page 1564 / 1750
» Diversifying search results
Sort
View
CCS
2008
ACM
13 years 11 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
MMM
2010
Springer
141views Multimedia» more  MMM 2010»
13 years 11 months ago
Slow Intelligence Systems
: Networks and distributed computing systems are becoming increasingly important and at the same time, more and more critical to the world of Information Technology. This rash spre...
Shi-Kuo Chang
CIKM
2008
Springer
13 years 11 months ago
A consensus based approach to constrained clustering of software requirements
Managing large-scale software projects involves a number of activities such as viewpoint extraction, feature detection, and requirements management, all of which require a human a...
Chuan Duan, Jane Cleland-Huang, Bamshad Mobasher
CLEF
2008
Springer
13 years 11 months ago
Overview of WebCLEF 2008
We describe the WebCLEF 2008 task. Similarly to the 2007 edition of WebCLEF, the 2008 edition implements a multilingual "information synthesis" task, where, for a given t...
Valentin Jijkoun, Maarten de Rijke
CLEF
2008
Springer
13 years 11 months ago
Overview of the Clef 2008 Multilingual Question Answering Track
The QA campaign at CLEF [1], was manly the same as that proposed last year. The results and the analyses reported by last year's participants suggested that the changes introd...
Pamela Forner, Anselmo Peñas, Eneko Agirre,...
« Prev « First page 1564 / 1750 Last » Next »