Sciweavers

15888 search results - page 2816 / 3178
» Supporting human-intensive systems
Sort
View
SIGIR
2010
ACM
15 years 8 months ago
Discriminative models of integrating document evidence and document-candidate associations for expert search
Generative models such as statistical language modeling have been widely studied in the task of expert search to model the relationship between experts and their expertise indicat...
Yi Fang, Luo Si, Aditya P. Mathur
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
15 years 8 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
DSN
2009
IEEE
15 years 8 months ago
HC-BGP: A light-weight and flexible scheme for securing prefix ownership
The Border Gateway Protocol (BGP) is a fundamental building block of the Internet infrastructure. However, due to the implicit trust assumption among networks, Internet routing re...
Ying Zhang, Zheng Zhang, Zhuoqing Morley Mao, Y. C...
127
Voted
GROUP
2007
ACM
15 years 8 months ago
Community, consensus, coercion, control: cs*w or how policy mediates mass participation
When large groups cooperate, issues of conflict and control surface because of differences in perspective. Managing such diverse views is a persistent problem in cooperative group...
Travis Kriplean, Ivan Beschastnikh, David W. McDon...
119
Voted
HT
2007
ACM
15 years 8 months ago
User-tailored web accessibility evaluations
This paper presents a framework and system to evaluate the accessibility of web pages according to the individual requirements of users with disabilities. These requirements not o...
Markel Vigo, Alfred Kobsa, Myriam Arrue, Julio Aba...
« Prev « First page 2816 / 3178 Last » Next »