Sciweavers

1818 search results - page 315 / 364
» How users use access control
Sort
View
DOCENG
2005
ACM
13 years 11 months ago
Generative semantic clustering in spatial hypertext
This paper presents an iterative method for generative semantic clustering of related information elements in spatial hypertext documents. The goal is to automatically organize th...
Andruid Kerne, Eunyee Koh, Vikram Sundaram, J. Mic...
WWW
2008
ACM
14 years 9 months ago
Geographic web usage estimation by monitoring DNS caches
DNS is one of the most actively used distributed databases on earth, accessed by millions of people every day to transparently convert host names into IP addresses and vice versa....
Hüseyin Akcan, Torsten Suel, Hervé Br&...
SIGIR
2010
ACM
14 years 29 days ago
Personalizing information retrieval for multi-session tasks: the roles of task stage and task type
Dwell time as a user behavior has been found in previous studies to be an unreliable predictor of document usefulness, with contextual factors such as the user’s task needing to...
Jingjing Liu, Nicholas J. Belkin
SAC
2008
ACM
13 years 8 months ago
Offline count-limited certificates
In this paper, we present the idea of offline count-limited certificates (or clics for short), and show how these can be implemented using minimal trusted hardware functionality a...
Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rho...
PKDD
2004
Springer
205views Data Mining» more  PKDD 2004»
14 years 2 months ago
Breaking Through the Syntax Barrier: Searching with Entities and Relations
The next wave in search technology will be driven by the identification, extraction, and exploitation of real-world entities represented in unstructured textual sources. Search sy...
Soumen Chakrabarti