Sciweavers

275 search results - page 36 / 55
» Trust Evaluation for Web Applications based on Behavioral An...
Sort
View
INFOCOM
2002
IEEE
14 years 1 months ago
Design and Scalability of NLS, a Scalable Naming and Location Service
This paper sketches the design, and presents a scalability analysis and evaluation of NLS, a scalable naming and location service. NLS resolves textual names to the nearest of a s...
Y. Charlie Hu, Daniel Rodney, Peter Druschel
WSDM
2010
ACM
213views Data Mining» more  WSDM 2010»
14 years 6 months ago
Corroborating Information from Disagreeing Views
We consider a set of views stating possibly conflicting facts. Negative facts in the views may come, e.g., from functional dependencies in the underlying database schema. We want ...
Alban Galland, Serge Abiteboul, Amélie Mari...
AAAI
2006
13 years 10 months ago
Using an Ontology for Knowledge Acquisition
We describe an approach to distributed knowledge acquisition using an ontology. The ontology is used to represent and reason about soldier performance. These methods are embedded ...
Stacy Lovell, Webb Stacy
CORR
2011
Springer
326views Education» more  CORR 2011»
13 years 3 months ago
Mining User Comment Activity for Detecting Forum Spammers in YouTube
Research shows that comment spamming (comments which are unsolicited, unrelated, abusive, hateful, commercial advertisements etc) in online discussion forums has become a common p...
Ashish Sureka
BMCBI
2005
179views more  BMCBI 2005»
13 years 8 months ago
MARS: Microarray analysis, retrieval, and storage system
Background: Microarray analysis has become a widely used technique for the study of geneexpression patterns on a genomic scale. As more and more laboratories are adopting microarr...
Michael Maurer, Robert Molidor, Alexander Sturn, J...