Sciweavers

389 search results - page 70 / 78
» Explorations and Experiences with Ambient Information System...
Sort
View
ATAL
2006
Springer
13 years 10 months ago
SAgent: a security framework for JADE
This paper presents SAgent, a general-purpose mobile agent security framework that is designed to protect the computations of mobile agent applications in potentially hostile envi...
Vandana Gunupudi, Stephen R. Tate
CLEF
2010
Springer
13 years 5 months ago
Examining the Robustness of Evaluation Metrics for Patent Retrieval with Incomplete Relevance Judgements
Recent years have seen a growing interest in research into patent retrieval. One of the key issues in conducting information retrieval (IR) research is meaningful evaluation of the...
Walid Magdy, Gareth J. F. Jones
CHI
2009
ACM
14 years 9 months ago
QUICKIES: the future of sticky notes
In this paper, we present `QUICKIES', an attempt to bring one of the most useful inventions of the 20th century into the digital age: the ubiquitous sticky notes. `QUICKIES&#...
Pranav Mistry
WSDM
2010
ACM
194views Data Mining» more  WSDM 2010»
14 years 6 months ago
Ranking with Query-Dependent Loss for Web Search
Queries describe the users' search intent and therefore they play an essential role in the context of ranking for information retrieval and Web search. However, most of exist...
Jiang Bian, Tie-Yan Liu, Tao Qin, Hongyuan Zha
ISI
2005
Springer
14 years 2 months ago
How Question Answering Technology Helps to Locate Malevolent Online Content
The inherent lack of control over the Internet content resulted in proliferation of online material that can be potentially detrimental. For example, the infamous “Anarchist Coo...
Dmitri Roussinov, Jose Antonio Robles-Flores