Sciweavers

15379 search results - page 377 / 3076
» Protecting users from
Sort
View
CIKM
2008
Springer
15 years 6 months ago
How should users access the content of digital books?
I report briefly on some of my own work in each of these areas and elucidate some of the questions that this research has raised. Then I propose as a research agenda the developme...
Nina Wacholder
DRM
2003
Springer
15 years 9 months ago
Obfuscation of design intent in object-oriented applications
Protection of digital data from unauthorized access is of paramount importance. In the past several years, much research has concentrated on protecting data from the standpoint of...
Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon
SIGIR
1999
ACM
15 years 8 months ago
Deriving Concept Hierarchies from Text
This paper presents a means of automatically deriving a hierarchical organization of concepts from a set of documents without use of training data or standard clustering technique...
Mark Sanderson, W. Bruce Croft
RAS
2006
94views more  RAS 2006»
15 years 4 months ago
Using perspective taking to learn from ambiguous demonstrations
This paper addresses an important issue in learning from demonstrations that are provided by "na
Cynthia Breazeal, Matt Berlin, Andrew G. Brooks, J...
119
Voted
DBSEC
2003
137views Database» more  DBSEC 2003»
15 years 5 months ago
Certifying Data from Multiple Sources
Abstract Data integrity can be problematic when integrating and organizing information from many sources. In this paper we describe efficient mechanisms that enable a group of data...
Glen Nuckolls, Charles U. Martel, Stuart G. Stubbl...