Sciweavers

2084 search results - page 411 / 417
» Knowledge Exploitation from the Web
Sort
View
ICTAI
2009
IEEE
14 years 2 months ago
Preventing Unwanted Social Inferences with Classification Tree Analysis
A serious threat to user privacy in new mobile and web2.0 applications stems from ‘social inferences’. These unwanted inferences are related to the users’ identity, current ...
Sara Motahari, Sotirios G. Ziavras, Quentin Jones
MHCI
2009
Springer
14 years 2 months ago
Information empowerment through mobile learning
Information empowers those who make sense from its successful interpretation; this is especially true on the subject of weather where the recipient is required to have prior forms...
Raymond Koon Chuan Koh, Henry Xin Liong Tan, Henry...
SIGIR
2009
ACM
14 years 2 months ago
On social networks and collaborative recommendation
Social network systems, like last.fm, play a significant role in Web 2.0, containing large amounts of multimedia-enriched data that are enhanced both by explicit user-provided an...
Ioannis Konstas, Vassilios Stathopoulos, Joemon M....
ECTEL
2007
Springer
14 years 2 months ago
An Interoperability Infrastructure for Distributed Feed Networks
Blogs have the aordance to become an integral part of teaching and learning processes as a vehicle for knowledge management. Open, exible systems integrating blogs provide user-f...
Fridolin Wild, Steinn E. Sigurðarson, Stefan S...
ASPLOS
2006
ACM
14 years 1 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...