Sciweavers

7352 search results - page 1428 / 1471
» Universal access to information
Sort
View
DOCENG
2007
ACM
14 years 18 days ago
SALT: a semantic approach for generating document representations
The structure of a document has an important influence on the perception of its content. Considering scientific publications, we can affirm that by making use of the ordinary line...
Tudor Groza, Alexander Schutz, Siegfried Handschuh
KDD
2010
ACM
240views Data Mining» more  KDD 2010»
14 years 17 days ago
Diagnosing memory leaks using graph mining on heap dumps
Memory leaks are caused by software programs that prevent the reclamation of memory that is no longer in use. They can cause significant slowdowns, exhaustion of available storag...
Evan K. Maxwell, Godmar Back, Naren Ramakrishnan
PERCOM
2010
ACM
14 years 16 days ago
Tuning to your position: FM radio based indoor localization with spontaneous recalibration
—Position of mobile users has become highly important information in pervasive computing environments. Indoor localization systems based on Wi-Fi signal strength fingerprinting t...
Aleksandar Matic, Andrei Papliatseyeu, Venet Osman...
SOUPS
2010
ACM
14 years 16 days ago
Feasibility of structural network clustering for group-based privacy control in social networks
Users of social networking sites often want to manage the sharing of information and content with different groups of people based on their differing relationships. However, group...
Simon Jones, Eamonn O'Neill
SOUPS
2010
ACM
14 years 16 days ago
Do windows users follow the principle of least privilege?: investigating user account control practices
The principle of least privilege requires that users and their programs be granted the most restrictive set of privileges possible to perform required tasks in order to limit the ...
Sara Motiee, Kirstie Hawkey, Konstantin Beznosov
« Prev « First page 1428 / 1471 Last » Next »