Sciweavers

2084 search results - page 134 / 417
» Knowledge Exploitation from the Web
Sort
View
110
Voted
ICWL
2003
Springer
15 years 8 months ago
A Web-Based Platform for E-learning Based on Information Management System
This paper presents an intelligent Information (course materials) Management System, (called AnyServer) which can serve as an Web based Learning platform (WLP) and enable course ed...
Pui-on Au, Leung Cheng, Weijia Jia, Paul Kai-on Ch...
DFT
2008
IEEE
149views VLSI» more  DFT 2008»
15 years 5 months ago
Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?
Side-channel attacks are nowadays a serious concern when implementing cryptographic algorithms. Powerful ways for gaining information about the secret key as well as various count...
Francesco Regazzoni, Thomas Eisenbarth, Luca Breve...
KDD
2008
ACM
162views Data Mining» more  KDD 2008»
16 years 3 months ago
Composition attacks and auxiliary information in data privacy
Privacy is an increasingly important aspect of data publishing. Reasoning about privacy, however, is fraught with pitfalls. One of the most significant is the auxiliary informatio...
Srivatsava Ranjit Ganta, Shiva Prasad Kasiviswanat...
153
Voted
IR
2006
15 years 3 months ago
A relatedness analysis of government regulations using domain knowledge and structural organization
The complexity and diversity of government regulations make understanding and retrieval of regulations a non-trivial task. One of the issues is the existence of multiple sources o...
Gloria T. Lau, Kincho H. Law, Gio Wiederhold
WWW
2007
ACM
16 years 4 months ago
Construction by linking: the linkbase method
The success of many innovative Web applications is not based on the content they produce ? but on how they combine and link existing content. Older Web Engineering methods lack fl...
Johannes Meinecke, Frederic Majer, Martin Gaedke