Sciweavers

8838 search results - page 1742 / 1768
» Generalizing Domain Theory
Sort
View
CCS
2010
ACM
13 years 7 months ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu
SIGCOMM
2010
ACM
13 years 7 months ago
Rethinking iBGP routing
The Internet is organized as a collection of administrative domains, known as Autonomous Systems (ASes). These ASes interact through the Border Gateway Protocol (BGP) that allows ...
Iuniana M. Oprescu, Mickael Meulle, Steve Uhlig, C...
SIGMOD
2010
ACM
201views Database» more  SIGMOD 2010»
13 years 7 months ago
I4E: interactive investigation of iterative information extraction
Information extraction systems are increasingly being used to mine structured information from unstructured text documents. A commonly used unsupervised technique is to build iter...
Anish Das Sarma, Alpa Jain, Divesh Srivastava
CLEF
2010
Springer
13 years 7 months ago
Overview of ResPubliQA 2010: Question Answering Evaluation over European Legislation
This paper describes the second round of ResPubliQA, a Question Answering (QA) evaluation task over European legislation, a LAB of CLEF 2010. Two tasks have been proposed this year...
Anselmo Peñas, Pamela Forner, Álvaro...
WWW
2010
ACM
13 years 7 months ago
Randomization tests for distinguishing social influence and homophily effects
Relational autocorrelation is ubiquitous in relational domains. This observed correlation between class labels of linked instances in a network (e.g., two friends are more likely ...
Timothy La Fond, Jennifer Neville
« Prev « First page 1742 / 1768 Last » Next »