Sciweavers

406 search results - page 27 / 82
» The Computation and Application of the Generalized Inverse v...
Sort
View
SIGCOMM
2006
ACM
14 years 3 months ago
SybilGuard: defending against sybil attacks via social networks
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake ident...
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, ...
SACMAT
2010
ACM
14 years 2 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
ICDM
2005
IEEE
217views Data Mining» more  ICDM 2005»
14 years 3 months ago
Improving Automatic Query Classification via Semi-Supervised Learning
Accurate topical classification of user queries allows for increased effectiveness and efficiency in general-purpose web search systems. Such classification becomes critical if th...
Steven M. Beitzel, Eric C. Jensen, Ophir Frieder, ...
MM
2003
ACM
110views Multimedia» more  MM 2003»
14 years 3 months ago
Music thumbnailing via structural analysis
Music thumbnailing (or music summarization) aims at finding the most representative part of a song, which can be used for web browsing, web searching and music recommendation. Thr...
Wei Chai, Barry Vercoe
CSCW
2004
ACM
14 years 3 months ago
Capturing and supporting contexts for scientific data sharing via the biological sciences collaboratory
Scientific collaboration is largely focused on the sharing and joint analysis of scientific data and results. Today, a movement is afoot within the scientific computing community ...
George Chin Jr., Carina Lansing