Sciweavers

132 search results - page 12 / 27
» Information retrieval system evaluation: effort, sensitivity...
Sort
View
ACISICIS
2009
IEEE
14 years 2 months ago
BackupIT: An Intrusion-Tolerant Cooperative Backup System
Reliable storage of large amounts of data is always a delicate issue. Availability, efficiency, data integrity, and confidentiality are some features a data backup system should...
Sérgio Raymundo Loest, Marcelo Cheminn Madr...
TKDE
2010
135views more  TKDE 2010»
13 years 5 months ago
A Rule-Based Trust Negotiation System
—Open distributed environments such as the World Wide Web facilitate information sharing but provide limited support to the protection of sensitive information and resources. Tru...
Piero A. Bonatti, Juri Luca De Coi, Daniel Olmedil...
WWW
2001
ACM
14 years 8 months ago
Scaling question answering to the Web
The wealth of information on the web makes it an attractive resource for seeking quick answers to simple, factual questions such as "who was the first American in space?"...
Cody C. T. Kwok, Oren Etzioni, Daniel S. Weld
WSMAI
2004
13 years 8 months ago
Scalable Continuous Query System for Web Databases
Continuous Queries (CQ) help users to retrieve results as soon as they become available. The CQ keeps track of two important events. If there is any change in the source informatio...
Ather Saeed, Savitri Bevinakoppa
CCS
2008
ACM
13 years 9 months ago
SOMA: mutual approval for included content in web pages
Unrestricted information flows are a key security weakness of current web design. Cross-site scripting, cross-site request forgery, and other attacks typically require that inform...
Terri Oda, Glenn Wurster, Paul C. van Oorschot, An...