Sciweavers

548 search results - page 45 / 110
» Modeling and predicting personal information dissemination b...
Sort
View
QSIC
2005
IEEE
14 years 2 months ago
Fault-Based Testing of Database Application Programs with Conceptual Data Model
Database application programs typically contain program units that use SQL statements to manipulate records in database instances. Testing the correctness of data manipulation by ...
W. K. Chan, S. C. Cheung, T. H. Tse
WWW
2010
ACM
14 years 3 months ago
Atomate it! end-user context-sensitive automation using heterogeneous information sources on the web
The transition of personal information management (PIM) tools off the desktop to the Web presents an opportunity to augment these tools with capabilities provided by the wealth o...
Max Van Kleek, Brennan Moore, David R. Karger, Pau...
ICDM
2007
IEEE
276views Data Mining» more  ICDM 2007»
14 years 3 months ago
SOPS: Stock Prediction Using Web Sentiment
Recently, the web has rapidly emerged as a great source of financial information ranging from news articles to personal opinions. Data mining and analysis of such financial info...
Vivek Sehgal, Charles Song
LCN
2008
IEEE
14 years 3 months ago
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks
— The absence of an online trusted authority makes the issue of key revocation in mobile ad hoc networks (MANETs) particularly challenging. In this paper, we present a novel self...
Xinxin Fan, Guang Gong
ACSAC
2005
IEEE
14 years 2 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji