Sciweavers

7315 search results - page 1252 / 1463
» Peer-to-Peer Information Search
Sort
View
DASFAA
2009
IEEE
133views Database» more  DASFAA 2009»
14 years 3 months ago
Probabilistic Ranking in Uncertain Vector Spaces
Abstract. In many application domains, e.g. sensor databases, traffic management or recognition systems, objects have to be compared based on positionally and existentially uncert...
Thomas Bernecker, Hans-Peter Kriegel, Matthias Ren...
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
14 years 3 months ago
A Theoretical Framework for Assessing Eavesdropping-Resistant Authentication Interfaces
A simple theoretical framework is developed to evaluate the security and usability of eavesdroppingresistant authentication schemes. Such schemes strive to allow users to authenti...
Bogdan Hoanca, Kenrick J. Mock
WSDM
2009
ACM
172views Data Mining» more  WSDM 2009»
14 years 3 months ago
Clustering the tagged web
Automatically clustering web pages into semantic groups promises improved search and browsing on the web. In this paper, we demonstrate how user-generated tags from largescale soc...
Daniel Ramage, Paul Heymann, Christopher D. Mannin...
CCGRID
2009
IEEE
14 years 3 months ago
Harvesting Large-Scale Grids for Software Resources
— Grid infrastructures are in operation around the world, federating an impressive collection of computational resources and a wide variety of application software. In this conte...
Asterios Katsifodimos, George Pallis, Marios D. Di...
CSE
2009
IEEE
14 years 3 months ago
Usable Privacy Controls for Blogs
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...
« Prev « First page 1252 / 1463 Last » Next »