Sciweavers

465 search results - page 71 / 93
» Letter from the Editor
Sort
View
COMPSEC
2004
105views more  COMPSEC 2004»
13 years 7 months ago
Rico: a security proxy for mobile code
Security technology suitable for the burgeoning embedded system market has not been widespread. Untrusted code downloaded from the Internet poses numerous security risks due to th...
Yougang Song, Brett D. Fleisch
CN
1998
78views more  CN 1998»
13 years 7 months ago
Twenty-One: Cross-Language Disclosure and Retrieval of Multimedia Documents on Sustainable Development
The Twenty-One project brings together environmental organisations, technology providers and research institutes from several European countries. The main objective of the project...
Wilco G. ter Stal, J.-H. Beijert, G. de Bruin, J. ...
IJPRAI
2002
142views more  IJPRAI 2002»
13 years 7 months ago
Improving Encarta Search Engine Performance by Mining User Logs
We propose a data-mining approach that produces generalized query patterns (with generalized keywords) from the raw user logs of the Microsoft Encarta search engine (http://encart...
Charles X. Ling, Jianfeng Gao, Huajie Zhang, Weini...
SIGIR
2002
ACM
13 years 7 months ago
Automatic evaluation of world wide web search services
Users of the World-Wide Web are not only confronted by an immense overabundance of information, but also by a plethora of tools for searching for the web pages that suit their inf...
Abdur Chowdhury, Ian Soboroff
IDT
2010
125views more  IDT 2010»
13 years 6 months ago
Automatic fusion of knowledge stored in ontologies
A person adds new knowledge to his/her mind, taking into account new information, additional details, better precision, synonyms, homonyms, redundancies, apparent contradictions, a...
Alma-Delia Cuevas, Adolfo Guzmán-Arenas