Sciweavers

7315 search results - page 1246 / 1463
» Peer-to-Peer Information Search
Sort
View
CCS
2009
ACM
14 years 8 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
CHI
2009
ACM
14 years 8 months ago
Critical methods and user generated content: the iPhone on YouTube
Sites like YouTube offer vast sources of data for studies of Human Computer Interaction (HCI). However, they also present a number of methodological challenges. This paper offers ...
Mark Blythe, Paul A. Cairns
CHI
2009
ACM
14 years 8 months ago
PlayByPlay: collaborative web browsing for desktop and mobile devices
Collaborative web browsing tasks occur frequently, such as one user showing another how to use a web site, several users working together on a search task, or even one user sendin...
Heather Wiltse, Jeffrey Nichols
KDD
2009
ACM
192views Data Mining» more  KDD 2009»
14 years 8 months ago
Time series shapelets: a new primitive for data mining
Classification of time series has been attracting great interest over the past decade. Recent empirical evidence has strongly suggested that the simple nearest neighbor algorithm ...
Lexiang Ye, Eamonn J. Keogh
KDD
2008
ACM
115views Data Mining» more  KDD 2008»
14 years 8 months ago
Topical query decomposition
We introduce the problem of query decomposition, where we are given a query and a document retrieval system, and we want to produce a small set of queries whose union of resulting...
Francesco Bonchi, Carlos Castillo, Debora Donato, ...
« Prev « First page 1246 / 1463 Last » Next »