Sciweavers

463 search results - page 86 / 93
» Document: a useful level for facing noisy data
Sort
View
SIGIR
2005
ACM
14 years 27 days ago
When will information retrieval be "good enough"?
We describe a user study that examined the relationship between the quality of an Information Retrieval system and the effectiveness of its users in performing a task. The task i...
James Allan, Ben Carterette, Joshua Lewis
MANSCI
2010
80views more  MANSCI 2010»
13 years 5 months ago
Impossible Frontiers
A key result of the Capital Asset Pricing Model (CAPM) is that the market portfolio— the portfolio of all assets in which each asset’s weight is proportional to its total mark...
Thomas J. Brennan, Andrew W. Lo
TELSYS
2010
140views more  TELSYS 2010»
13 years 2 months ago
Information system security compliance to FISMA standard: a quantitative measure
To ensure that safeguards are implemented to protect against a majority of known threats, industry leaders are requiring information processing systems to comply with security stan...
Elaine Hulitt, Rayford B. Vaughn
MOBIDE
2005
ACM
14 years 27 days ago
Towards universal mobile caching
In the context of mobile data access, data caching is fundamental for both performance and functionality. For this reason there have been many studies into developing energy-effi...
Ganesh Santhanakrishnan, Ahmed Amer, Panos K. Chry...
CCS
2011
ACM
12 years 7 months ago
MIDeA: a multi-parallel intrusion detection architecture
Network intrusion detection systems are faced with the challenge of identifying diverse attacks, in extremely high speed networks. For this reason, they must operate at multi-Giga...
Giorgos Vasiliadis, Michalis Polychronakis, Sotiri...