Sciweavers

702 search results - page 81 / 141
» Low-fidelity location based information systems
Sort
View
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 4 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
CIKM
2009
Springer
14 years 4 months ago
Collaborative filtering using random neighbours in peer-to-peer networks
Traditionally, collaborative filtering (CF) algorithms used for recommendation operate on complete knowledge. This makes these algorithms hard to employ in a decentralized contex...
Arno Bakker, Elth Ogston, Maarten van Steen
WWW
2007
ACM
14 years 10 months ago
Towards extracting flickr tag semantics
We address the problem of extracting semantics of tags ? short, unstructured text-labels assigned to resources on the Web ? based on each tag's metadata patterns. In particul...
Tye Rattenbury, Nathan Good, Mor Naaman
EUSAI
2004
Springer
14 years 1 months ago
Confidence Estimation of the State Predictor Method
Pervasive resp. ubiquitous systems use context information to adapt appliance behavior to human needs. Even more convenience is reached if the appliance foresees the user's de...
Jan Petzold, Faruk Bagci, Wolfgang Trumler, Theo U...
WWW
2008
ACM
14 years 10 months ago
Analysis of geographic queries in a search engine log
Geography is becoming increasingly important in web search. Search engines can often return better results to users by analyzing features such as user location or geographic terms...
Qingqing Gan, Josh Attenberg, Alexander Markowetz,...