Sciweavers

15888 search results - page 2943 / 3178
» Supporting human-intensive systems
Sort
View
124
Voted
DIMVA
2008
15 years 5 months ago
Expanding Malware Defense by Securing Software Installations
Software installation provides an attractive entry vector for malware: since installations are performed with administrator privileges, malware can easily get the enhanced level of...
Weiqing Sun, R. Sekar, Zhenkai Liang, V. N. Venkat...
108
Voted
HCI
2007
15 years 5 months ago
Informative Art Display Metaphors
Informative Art display systems have been proposed to provide users with information considered relevant at arbitrary points of work or living engagement, originating from many dif...
Alois Ferscha
108
Voted
IJCAI
2007
15 years 5 months ago
Open Information Extraction from the Web
Traditionally, Information Extraction (IE) has focused on satisfying precise, narrow, pre-specified requests from small homogeneous corpora (e.g., extract the location and time o...
Michele Banko, Michael J. Cafarella, Stephen Soder...
142
Voted
SODA
2008
ACM
126views Algorithms» more  SODA 2008»
15 years 5 months ago
On distributing symmetric streaming computations
A common approach for dealing with large data sets is to stream over the input in one pass, and perform computations using sublinear resources. For truly massive data sets, howeve...
Jon Feldman, S. Muthukrishnan, Anastasios Sidiropo...
145
Voted
DLOG
2006
15 years 5 months ago
Tableau Caching for Description Logics with Inverse and Transitive Roles
Abstract. Modern description logic (DL) reasoners are known to be less efficient for DLs with inverse roles. The current loss of performance is largely due to the missing applicabi...
Yu Ding, Volker Haarslev
« Prev « First page 2943 / 3178 Last » Next »