Sciweavers

8301 search results - page 1561 / 1661
» Risk-Aware Information Retrieval
Sort
View
NDSS
2002
IEEE
14 years 3 months ago
Detecting Steganographic Content on the Internet
Steganography is used to hide the occurrence of communication. Recent suggestions in US newspapers indicate that terrorists use steganography to communicate in secret with their a...
Niels Provos, Peter Honeyman
PDP
2002
IEEE
14 years 3 months ago
A Hardware-Accelerated Novel IR System
AURA (Advanced Uncertain Reasoning Architecture) is a generic family of techniques and implementations intended for high-speed approximate search and match operations on large uns...
Michael Weeks, Victoria J. Hodge, Jim Austin
WISE
2002
Springer
14 years 3 months ago
Evaluating and Enhancing Meta-Search Performance in Digital Libraries
Applying meta search systems is a suitable method to support the user if there are many different retrieval services available in the Web. Due to information splitting strategies ...
Bethina Schmitt, Sven Oberländer
ICWE
2010
Springer
14 years 3 months ago
Ranking the Linked Data: The Case of DBpedia
The recent proliferation of crowd computing initiatives on the web calls for smarter methodologies and tools to annotate, query and explore repositories. There is the need for scal...
Roberto Mirizzi, Azzurra Ragone, Tommaso Di Noia, ...
CISIS
2009
IEEE
14 years 3 months ago
Semi-Automatic Annotation System for OWL-Based Semantic Search
—Current keyword search by Google, Yahoo, and so on gives enormous unsuitable results. A solution to this perhaps is to annotate semantics to textual web data to enable semantic ...
C.-H. Liu, H.-C. Chen, J.-L. Jain, J.-Y. Chen
« Prev « First page 1561 / 1661 Last » Next »