Sciweavers

986 search results - page 188 / 198
» Who are the Internet Content Providers
Sort
View
HT
2011
ACM
12 years 11 months ago
Bridging link and query intent to enhance web search
Understanding query intent is essential to generating appropriate rankings for users. Existing methods have provided customized rankings to answer queries with different intent. W...
Na Dai, Xiaoguang Qi, Brian D. Davison
CSCW
2012
ACM
12 years 3 months ago
Blogs as a collective war diary
Disaster-related research in human-centered computing has typically focused on the shorter-term, emergency period of a disaster event, whereas effects of some crises are longterm,...
Gloria Mark, Mossaab Bagdouri, Leysia Palen, James...
CISC
2007
Springer
98views Cryptology» more  CISC 2007»
14 years 1 months ago
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Abstract. The Trusted Computing Group (TCG) defines the specifications for the Trusted Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled platform ...
Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffr...
ICWE
2007
Springer
14 years 1 months ago
MDWEnet: A Practical Approach to Achieving Interoperability of Model-Driven Web Engineering Methods
Current model-driven Web Engineering approaches (such as OO-H, UWE or WebML) provide a set of methods and supporting tools for a systematic design and development of Web applicatio...
Antonio Vallecillo, Nora Koch, Cristina Cachero, S...
SEMWEB
2007
Springer
14 years 1 months ago
Vocabulary Patterns in Free-for-all Collaborative Indexing Systems
In collaborative indexing systems users generate a big amount of metadata by labelling web-based content. These labels are known as tags and form a shared vocabulary. In order to u...
Wolfgang Maass, Tobias Kowatsch, Timo Münster