Sciweavers

95 search results - page 18 / 19
» Towards a Logical Reconstruction of Information Retrieval Th...
Sort
View
PLDI
2009
ACM
14 years 2 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
CN
1998
122views more  CN 1998»
13 years 7 months ago
The Web: Interactive and Multimedia Education
The World Wide Web is becoming increasingly important in the provision of education, as recognised by several high profile UK government reports. Improved tools for developing We...
Robert Allen
MM
2009
ACM
277views Multimedia» more  MM 2009»
14 years 2 months ago
Inferring semantic concepts from community-contributed images and noisy tags
In this paper, we exploit the problem of inferring images’ semantic concepts from community-contributed images and their associated noisy tags. To infer the concepts more accura...
Jinhui Tang, Shuicheng Yan, Richang Hong, Guo-Jun ...
SEMWEB
2010
Springer
13 years 5 months ago
Supporting Natural Language Processing with Background Knowledge: Coreference Resolution Case
Systems based on statistical and machine learning methods have been shown to be extremely effective and scalable for the analysis of large amount of textual data. However, in the r...
Volha Bryl, Claudio Giuliano, Luciano Serafini, Ka...
CCECE
2006
IEEE
14 years 1 months ago
A Dynamic Associative E-Learning Model based on a Spreading Activation Network
Presenting information to an e-learning environment is a challenge, mostly, because ofthe hypertextlhypermedia nature and the richness ofthe context and information provides. This...
Phongchai Nilas, Nilamit Nilas, Somsak Mitatha