Sciweavers

2788 search results - page 57 / 558
» Use of Data Recharging for Personal Information Environment
Sort
View
ECIS
2003
13 years 10 months ago
Using online services in untrusted environments: a privacy-preserving architecture
While online service providers are sometimes accused of forwarding identifying customer information as name and address to untrusted third parties, comparatively little attention ...
Claus Boyens, Oliver Günther
ICIAP
2007
ACM
14 years 2 months ago
Image Spam Filtering Using Visual Information
We address the problem of recognizing the so-called image spam, which consists in embedding the spam message into attached images to defeat techniques based on the analysis of e-m...
Battista Biggio, Giorgio Fumera, Ignazio Pillai, F...
ISCAPDCS
2001
13 years 10 months ago
Bandwidth Learning in Distributed Networking Environments for Global Information Dissemination
- This work investigates bandwidth learning algorithms in a version of a distributed heterogeneous data dissemination system called the Agile Information Control Environment (AICE)...
Craig Sullivan, Michael Jurczyk
SIGMOD
2011
ACM
242views Database» more  SIGMOD 2011»
12 years 11 months ago
The SystemT IDE: an integrated development environment for information extraction rules
Information Extraction (IE) — the problem of extracting structured information from unstructured text — has become the key enabler for many enterprise applications such as sem...
Laura Chiticariu, Vivian Chu, Sajib Dasgupta, Thil...
WWW
2007
ACM
14 years 9 months ago
P-TAG: large scale automatic generation of personalized annotation tags for the web
The success of the Semantic Web depends on the availability of Web pages annotated with metadata. Free form metadata or tags, as used in social bookmarking and folksonomies, have ...
Paul-Alexandru Chirita, Stefania Costache, Wolfgan...