Sciweavers

219 search results - page 36 / 44
» Priberam's Question Answering System in QA@CLEF 2008
Sort
View
DIM
2008
ACM
13 years 9 months ago
Quantifying the security of preference-based authentication
We describe a technique aimed at addressing longstanding problems for password reset: security and cost. In our approach, users are authenticated using their preferences. Experime...
Markus Jakobsson, Liu Yang, Susanne Wetzel
IJMMS
2008
108views more  IJMMS 2008»
13 years 8 months ago
Ontology-based information extraction and integration from heterogeneous data sources
In this paper we present the design, implementation and evaluation of SOBA, a system for ontology-based information extraction from heterogeneous data resources, including plain t...
Paul Buitelaar, Philipp Cimiano, Anette Frank, Mat...
BIS
2008
174views Business» more  BIS 2008»
13 years 9 months ago
Hubbub - An Innovative Customer Support Forum
Internet user forums have been proven to be effective not just as a community meeting place but also as a supporting tool for various business products. Traditional forums are desi...
Duong Nguyen, Simon Thompson, Cefn Hoile
CCR
2008
86views more  CCR 2008»
13 years 8 months ago
The need for simulation in evaluating anomaly detectors
Anomalous events that affect the performance of networks are a fact of life. It is therefore not surprising that recent years have seen an explosion in research on network anomaly...
Haakon Ringberg, Matthew Roughan, Jennifer Rexford
CISS
2008
IEEE
14 years 2 months ago
A linear integer programming approach to analyze P2P media streaming
Recent advancement in peer-to-peer (P2P) technologies has enabled a wide range of new applications. In this paper, we present mixed integer programming (MIP) formulations to analy...
Fulu Li, Jianwei Huang, Andrew Lippman