Sciweavers

570 search results - page 113 / 114
» How to Evaluate Models of User Affect
Sort
View
COLING
2010
13 years 2 months ago
Contextual Recommendation based on Text Mining
The potential benefit of integrating contextual information for recommendation has received much research attention recently, especially with the ever-increasing interest in mobil...
Yize Li, Jiazhong Nie, Yi Zhang, Bingqing Wang, Ba...
WWW
2011
ACM
13 years 2 months ago
Improving recommendation for long-tail queries via templates
The ability to aggregate huge volumes of queries over a large population of users allows search engines to build precise models for a variety of query-assistance features such as ...
Idan Szpektor, Aristides Gionis, Yoelle Maarek
SIGMOD
2003
ACM
124views Database» more  SIGMOD 2003»
14 years 7 months ago
Dynamic XML documents with distribution and replication
The advent of XML as a universal exchange format, and of Web services as a basis for distributed computing, has fostered the apparition of a new class of documents: dynamic XML do...
Serge Abiteboul, Angela Bonifati, Gregory Cobena, ...
EDBT
2008
ACM
147views Database» more  EDBT 2008»
14 years 7 months ago
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage
In this demonstration, we present the design and features of iDataGuard. iDataGuard is an interoperable security middleware that allows users to outsource their file systems to he...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
SACMAT
2009
ACM
14 years 2 months ago
Symbolic reachability analysis for parameterized administrative role based access control
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role ba...
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C....