Sciweavers

78 search results - page 10 / 16
» Who are you
Sort
View
JSS
2002
96views more  JSS 2002»
13 years 7 months ago
A group signature scheme with strong separability
Group signatures, introduced by Chaum and van Heijst, allow members of a group to sign messages anonymously on behalf of the group. Only a designated group manager is able to iden...
Shundong Xia, Jinyuan You
ICDM
2010
IEEE
205views Data Mining» more  ICDM 2010»
13 years 5 months ago
Knowledge File System -- A Principled Approach to Personal Information Management
The Knowledge File System (KFS) is a smart virtual file system that sits between the operating system and the file system. Its primary functionality is to automatically organize fi...
Kuiyu Chang, I. Wayan Tresna Perdana, Bramandia Ra...
AMR
2007
Springer
167views Multimedia» more  AMR 2007»
14 years 1 months ago
Ontology: Use and Abuse
This paper is a critical analysis of the use of ontology as an instrument to specify the semantics of a document. The paper argue that not only is a logic of the type used in ontol...
Simone Santini
WWW
2005
ACM
14 years 8 months ago
Disambiguating Web appearances of people in a social network
Say you are looking for information about a particular person. A search engine returns many pages for that person's name but which pages are about the person you care about, ...
Ron Bekkerman, Andrew McCallum
SIGUCCS
2000
ACM
13 years 11 months ago
Developing and Implementing a Comprehensive Training and Incentive Program for Student Employees in Information Technology
Anyone who works with student employees knows that while it is often difficult to train sufficiently, it is of the utmost importance to have a qualified, knowledgeable staff. We w...
Jim Osborn