Sciweavers

5048 search results - page 777 / 1010
» How to Personalize the Web
Sort
View
NDSS
2002
IEEE
15 years 9 months ago
An Analysis of the Degradation of Anonymous Protocols
There have been a number of protocols proposed for anonymous network communication. In this paper we investigate attacks by corrupt group members that degrade the anonymity of eac...
Matthew Wright, Micah Adler, Brian Neil Levine, Cl...
WSDM
2010
ACM
211views Data Mining» more  WSDM 2010»
15 years 9 months ago
IntervalRank - Isotonic Regression with Listwise and Pairwise Constraints
Ranking a set of retrieved documents according to their relevance to a given query has become a popular problem at the intersection of web search, machine learning, and informatio...
Taesup Moon, Alex Smola, Yi Chang, Zhaohui Zheng
SIGDOC
1999
ACM
15 years 8 months ago
Role-based access control in online authoring and publishing systems vs. document hierarchy
How to structure diverse (documentation) information sources of an enterprise and how to arrange a workflow with access control are two important issues for online authoring and p...
Zhongdong Zhang, Ernst Georg Haffner, Andreas Heue...
IDEAS
1999
IEEE
101views Database» more  IDEAS 1999»
15 years 8 months ago
Integration of Semistructured Data with Partial and Inconsistent Information
Data integration of several sources has gained considerable attentions with the recent popularity of the Web. In the real world, some information may be missing i.e., partial and ...
Mengchi Liu, Tok Wang Ling, Tao Guan
ACSAC
2004
IEEE
15 years 8 months ago
Open-Source Applications of TCPA Hardware
How can Alice trust computation occurring at Bob's computer? Since it exists and is becoming ubiquitous, the current-generation TCPA/TCG hardware might enable a solution. Whe...
John Marchesini, Sean W. Smith, Omen Wild, Joshua ...