Sciweavers

18697 search results - page 3644 / 3740
» Systemic Security Management
Sort
View
WWW
2007
ACM
16 years 5 months ago
Towards effective browsing of large scale social annotations
This paper is concerned with the problem of browsing social annotations. Today, a lot of services (e.g., Del.icio.us, Filckr) have been provided for helping users to manage and sh...
Rui Li, Shenghua Bao, Yong Yu, Ben Fei, Zhong Su
WWW
2006
ACM
16 years 5 months ago
Knowledge modeling and its application in life sciences: a tale of two ontologies
High throughput glycoproteomics, similar to genomics and proteomics, involves extremely large volumes of distributed, heterogeneous data as a basis for identification and quantifi...
Satya Sanket Sahoo, Christopher Thomas, Amit P. Sh...
WWW
2006
ACM
16 years 5 months ago
Time-dependent semantic similarity measure of queries using historical click-through data
It has become a promising direction to measure similarity of Web search queries by mining the increasing amount of clickthrough data logged by Web search engines, which record the...
Qiankun Zhao, Steven C. H. Hoi, Tie-Yan Liu, Soura...
WWW
2005
ACM
16 years 5 months ago
Disambiguating Web appearances of people in a social network
Say you are looking for information about a particular person. A search engine returns many pages for that person's name but which pages are about the person you care about, ...
Ron Bekkerman, Andrew McCallum
127
Voted
WWW
2005
ACM
16 years 5 months ago
Ensuring required failure atomicity of composite Web services
The recent evolution of Internet, driven by the Web services technology, is extending the role of the Web from a support of information interaction to a middleware for B2B interac...
Sami Bhiri, Olivier Perrin, Claude Godart
« Prev « First page 3644 / 3740 Last » Next »