Sciweavers

1756 search results - page 270 / 352
» Mining Query Logs
Sort
View
CCS
2010
ACM
14 years 4 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
SUTC
2008
IEEE
14 years 4 months ago
EvAnT: Analysis and Checking of Event Traces for Wireless Sensor Networks
Testing and verification methodologies for Wireless Sensor Networks (WSN) systems in pre-deployment are vital for a successful deployment. Increased visibility of the internal st...
Matthias Woehrle, Christian Plessl, Roman Lim, Jan...
CIKM
2007
Springer
14 years 4 months ago
Utilizing a geometry of context for enhanced implicit feedback
Implicit feedback algorithms utilize interaction between searchers and search systems to learn more about users’ needs and interests than expressed in query statements alone. Th...
Massimo Melucci, Ryen W. White
SIGIR
2010
ACM
14 years 1 months ago
How good is a span of terms?: exploiting proximity to improve web retrieval
Ranking search results is a fundamental problem in information retrieval. In this paper we explore whether the use of proximity and phrase information can improve web retrieval ac...
Krysta Marie Svore, Pallika H. Kanani, Nazan Khan
COMPGEOM
1995
ACM
14 years 1 months ago
Approximate Range Searching
The range searching problem is a fundamental problem in computational geometry, with numerous important applications. Most research has focused on solving this problem exactly, bu...
Sunil Arya, David M. Mount