Sciweavers

1407 search results - page 249 / 282
» Systems Theory Model for Information Security
Sort
View
PLPV
2011
ACM
12 years 12 months ago
Local actions for a curry-style operational semantics
Soundness proofs of program logics such as Hoare logics and type systems are often made easier by decorating the operational semantics with information that is useful in the proof...
Gordon Stewart, Andrew W. Appel
WWW
2009
ACM
14 years 9 months ago
Search shortcuts: driving users towards their goals
Giving suggestions to users of Web-based services is a common practice aimed at enhancing their navigation experience. Major Web Search Engines usually provide Suggestions under t...
Ranieri Baraglia, Fidel Cacheda, Victor Carneiro, ...
WWW
2004
ACM
14 years 9 months ago
Ranking the web frontier
The celebrated PageRank algorithm has proved to be a very effective paradigm for ranking results of web search algorithms. In this paper we refine this basic paradigm to take into...
Nadav Eiron, Kevin S. McCurley, John A. Tomlin
ADBIS
2007
Springer
132views Database» more  ADBIS 2007»
14 years 3 months ago
Clustering Approach to Generalized Pattern Identification Based on Multi-instanced Objects with DARA
Clustering is an essential data mining task with various types of applications. Traditional clustering algorithms are based on a vector space model representation. A relational dat...
Rayner Alfred, Dimitar Kazakov
SIGIR
2005
ACM
14 years 2 months ago
On the collective classification of email "speech acts"
We consider classification of email messages as to whether or not they contain certain “email acts”, such as a request or a commitment. We show that exploiting the sequential ...
Vitor Rocha de Carvalho, William W. Cohen