Sciweavers

192 search results - page 18 / 39
» Who gets spammed
Sort
View
CSE
2009
IEEE
13 years 5 months ago
The Use of Online Videos in the 2008 U.S. Congressional Elections
With 39% of Americans admitting the use of the Web to get unfiltered campaign materials, it becomes important to evaluate how they are searching for these materials and what they a...
Eni Mustafaraj, Panagiotis Takis Metaxas, Catherin...
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
14 years 1 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
BMCBI
2005
103views more  BMCBI 2005»
13 years 7 months ago
MicroGen: a MIAME compliant web system for microarray experiment information and workflow management
Background: Improvements of bio-nano-technologies and biomolecular techniques have led to increasing production of high-throughput experimental data. Spotted cDNA microarray is on...
Sarah Burgarella, Dario Cattaneo, Francesco Pincir...
DLOG
2009
13 years 5 months ago
Explaining by Example: Model Exploration for Ontology Comprehension
Abstract. In this paper, we describe an approach for ontology comprehension support called model exploration in which models for ontologies are generated and presented interactivel...
Johannes Bauer, Ulrike Sattler, Bijan Parsia
ICDE
2002
IEEE
163views Database» more  ICDE 2002»
14 years 8 months ago
Keyword Searching and Browsing in Databases using BANKS
With the growth of the Web, there has been a rapid increase in the number of users who need to access online databases without having a detailed knowledge of the schema or of quer...
Gaurav Bhalotia, Arvind Hulgeri, Charuta Nakhe, So...