Sciweavers

1317 search results - page 51 / 264
» context 2005
Sort
View
ACSAC
2005
IEEE
14 years 2 months ago
Looking Back at the Bell-La Padula Model
The Bell-La Padula security model produced conceptual tools for the analysis and design of secure computer systems. Together with its sibling engineering initiatives, it identifi...
David Elliott Bell
WINE
2005
Springer
131views Economy» more  WINE 2005»
14 years 2 months ago
Experiments with an Economic Model of the Worldwide Web
We present a simple model in which the worldwide web (www) is created by the interaction of selfish agents, namely document authors, users, and search engines. We show experimental...
Georgios Kouroupas, Elias Koutsoupias, Christos H....
ICITA
2005
IEEE
14 years 2 months ago
Automated Question Answering: Review of the Main Approaches
Automated Question- Answering aims at delivering concise information that contains answers to user questions. This paper reviews and compares three main question-answering approac...
Andrea Andrenucci, Eriks Sneiders
CICLING
2006
Springer
14 years 17 days ago
An Unsupervised Language Independent Method of Name Discrimination Using Second Order Co-occurrence Features
Previous work by Pedersen, Purandare and Kulkarni (2005) has resulted in an unsupervised method of name discrimination that represents the context in which an ambiguous name occurs...
Ted Pedersen, Anagha Kulkarni, Roxana Angheluta, Z...
PKDD
2005
Springer
164views Data Mining» more  PKDD 2005»
14 years 2 months ago
Clustering and Prediction of Mobile User Routes from Cellular Data
Location-awareness and prediction of future locations is an important problem in pervasive and mobile computing. In cellular systems (e.g., GSM) the serving cell is easily availabl...
Kari Laasonen