Sciweavers

221 search results - page 33 / 45
» Exploiting multi-evidence from multiple user's interests to ...
Sort
View
CIKM
2005
Springer
14 years 27 days ago
MailRank: using ranking for spam detection
Can we use social networks to combat spam? This paper investigates the feasibility of MailRank, a new email ranking and classification scheme exploiting the social communication ...
Paul-Alexandru Chirita, Jörg Diederich, Wolfg...
CCS
2011
ACM
12 years 7 months ago
SURF: detecting and measuring search poisoning
Search engine optimization (SEO) techniques are often abused to promote websites among search results. This is a practice known as blackhat SEO. In this paper we tackle a newly em...
Long Lu, Roberto Perdisci, Wenke Lee
PERCOM
2007
ACM
14 years 7 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
WWW
2006
ACM
14 years 8 months ago
Searching with context
Contextual search refers to proactively capturing the information need of a user by automatically augmenting the user query with information extracted from the search context; for...
Reiner Kraft, Chi-Chao Chang, Farzin Maghoul, Ravi...
ICASSP
2008
IEEE
14 years 1 months ago
Predictive fusion coding of spatio-temporally correlated sources
This paper considers the problem of predictive fusion coding for storage of multiple spatio-temporally correlated sources so as to enable efficient selective retrieval of data fr...
Sharadh Ramaswamy, Kenneth Rose