Sciweavers

15379 search results - page 262 / 3076
» Protecting users from
Sort
View
COLING
2010
13 years 3 months ago
Utilizing Variability of Time and Term Content, within and across Users in Session Detection
In this paper, we describe a SVM classification framework of session detection task on both Chinese and English query logs. With eight features on the aspects of temporal and cont...
Shu-Qi Sun, Sheng Li, Muyun Yang, Haoliang Qi, Tie...
ACL
2008
13 years 9 months ago
Assessing Dialog System User Simulation Evaluation Measures Using Human Judges
Previous studies evaluate simulated dialog corpora using evaluation measures which can be automatically extracted from the dialog systems' logs. However, the validity of thes...
Hua Ai, Diane J. Litman
SACMAT
2005
ACM
14 years 1 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...
AIS
2006
Springer
13 years 8 months ago
Togetherness and respect: ethical concerns of privacy in Global Web Societies
Today's computer network technologies are sociologically founded on hunter-gatherer principles; common users may be possible subjects of surveillance and sophisticated Interne...
Gordana Dodig-Crnkovic, Virginia Horniak
HICSS
2010
IEEE
178views Biometrics» more  HICSS 2010»
14 years 1 months ago
A Collaboration Model for ERP User-System Interaction
Enterprise Resource Planning (ERP) systems have received well-deserved attention from both the industry and the research communities, yet the usability of these systems remains a ...
Jay G. Cooprider, Heikki Topi, Jennifer Xu, Martin...