Sciweavers

216 search results - page 34 / 44
» Explaining User Errors in Knowledge Base Completion
Sort
View
MMMACNS
2005
Springer
14 years 2 months ago
A Passive External Web Surveillance Technique for Private Networks
The variety and richness of what users browse on the Internet has made the communications of web-browsing hosts an attractive target for surveillance. We show that passive external...
Constantine Daicos, Scott Knight
PODS
2009
ACM
134views Database» more  PODS 2009»
14 years 9 months ago
Relationship privacy: output perturbation for queries with joins
We study privacy-preserving query answering over data containing relationships. A social network is a prime example of such data, where the nodes represent individuals and edges r...
Vibhor Rastogi, Michael Hay, Gerome Miklau, Dan Su...
ECAI
2004
Springer
14 years 2 months ago
Emergence of Complex Networks through Local Optimization
Abstract. The emergence of complex network structures of relationships between autonomous agents occurs in a wide range of distributed systems. Many researchers have proposed model...
Josep M. Pujol, Andreas Flache, Ramon Sangües...
IWC
2007
120views more  IWC 2007»
13 years 8 months ago
Visualizing set concordance with permutation matrices and fan diagrams
Scientific problem solving often involves concordance (or discordance) analysis among the result sets from different approaches. For example, different scientific analysis met...
Bo Hyoung Kim, Bongshin Lee, Jinwook Seo
CHI
2008
ACM
14 years 9 months ago
Love and authentication
Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...