Sciweavers

492 search results - page 64 / 99
» Managing the 'Evaluator Effect' in User Testing
Sort
View
SOUPS
2006
ACM
14 years 1 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
CIKM
2006
Springer
13 years 11 months ago
Re-ranking search results using query logs
This work addresses two common problems in search, frequently occurring with underspecified user queries: the top-ranked results for such queries may not contain documents relevan...
Ziming Zhuang, Silviu Cucerzan
GLVLSI
2007
IEEE
211views VLSI» more  GLVLSI 2007»
14 years 2 months ago
Multi-processor operating system emulation framework with thermal feedback for systems-on-chip
Multi-Processor System-On-Chip (MPSoC) can provide the performance levels required by high-end embedded applications. However, they do so at the price of an increasing power densi...
Salvatore Carta, Andrea Acquaviva, Pablo Garcia De...
DOLAP
1999
ACM
13 years 12 months ago
starER: A Conceptual Model for Data Warehouse Design
Modeling data warehouses is a complex task focusing, very often, into internal structures and implementation issues. In this paper we argue that, in order to accurately reflect the...
Nectaria Tryfona, Frank Busborg, Jens G. Borch Chr...
ESWS
2008
Springer
13 years 9 months ago
Combining Fact and Document Retrieval with Spreading Activation for Semantic Desktop Search
Abstract. The Semantic Desktop is a means to support users in Personal Information Management (PIM). It provides an excellent test bed for Semantic Web technology: resources (e. g....
Kinga Schumacher, Michael Sintek, Leo Sauermann