Sciweavers

1056 search results - page 89 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
ICC
2009
IEEE
118views Communications» more  ICC 2009»
14 years 4 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
CIKM
2009
Springer
14 years 4 months ago
Annotating wikipedia articles with semantic tags for structured retrieval
Structured retrieval aims at exploiting the structural information of documents when searching for documents. Structured retrieval makes use of both content and structure of docum...
Saravadee Sae Tan, Tang Enya Kong, Gian Chand Sodh...
SAT
2009
Springer
132views Hardware» more  SAT 2009»
14 years 4 months ago
Relaxed DPLL Search for MaxSAT
We propose a new incomplete algorithm for the Maximum Satisfiability (MaxSAT) problem on unweighted Boolean formulas, focused specifically on instances for which proving unsatis...
Lukas Kroc, Ashish Sabharwal, Bart Selman
CIKM
2007
Springer
14 years 4 months ago
"I know what you did last summer": query logs and user privacy
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers ...
Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins
HICSS
2006
IEEE
146views Biometrics» more  HICSS 2006»
14 years 4 months ago
A Paradigmatic and Methodological Examination of KM Research: 2000 to 2004
This study addresses a long-standing and wellrecognized problem in KM research, namely the lack of a cumulative tradition. This problem is addressed by an intensive and critical r...
Zining Guo, James Sheffield