搜索结果: 1-15 共查到“计算机科学技术基础学科 Information”相关记录30条 . 查询时间(0.203 秒)
第16届高级信息技术管理会议(16th Conference on Advanced Information Technologies for Management (AITM’18)ociety (IT4MBS))
第16届 高级 信息技术管理 会议
font style='font-size:12px;'>
2018/1/20
We are pleased to invite you to participate in the 16th edition of Conference on “Advanced Information Technologies for Management AITM’18”. The main purpose of the conference is to provide a forum fo...
ICITS 2016:9th International Conference on Information Theoretic Security
Key message rates
font style='font-size:12px;'>
2016/7/19
This is the ninth in a series of conferences that aims to bring together the leading researchers in the areas of information theory, quantum information theory, and cryptography. ICITS covers all aspe...
Secure Information Flow as a Safety Problem
Secure Information Flow Safety Problem
font style='font-size:12px;'>
2016/5/24
The termination insensitive secure information flow problem can be reduced to solving a safety problem via a simple program transformation.Barthe, D’Argenio, and Rezk coined the term “self-composition...
Modelgen: Mining Explicit Information Flow Specifications from Concrete Executions
Dynamic analysis specification mining information flow
font style='font-size:12px;'>
2016/5/24
We present a technique to mine explicit information flow specifications from concrete executions. These specifications can be consumed by a static taint analysis, enabling static analysis to work even...
Interactively Verifying Absence of Explicit Information Flows in Android Apps
interactive verification abductive inference specifications from tests
font style='font-size:12px;'>
2016/5/24
App stores are increasingly the preferred mechanism for distributing software, including mobile apps (Google Play),desktop apps (Mac App Store and Ubuntu Software Center),computer games (the Steam Sto...
PIKM 2014: The 7th ACM Workshop for Ph.D. Students in Information and Knowledge Management
CIKM PIKM doctoral consortium Ph.D. forum disser- tations database systems
font style='font-size:12px;'>
2016/1/22
PIKM workshop offers to Ph.D. students the possibility to bring their work to an international and interdisciplinary re-search community, and create a network of young researchers to exchange and deve...
Local Information in Influence Networks
InfluenceNetworks Multi-hopInformation HierarchyofAlgorithms Distributed Algorithms
font style='font-size:12px;'>
2016/1/22
We study how multi-hop information impacts convergence in social influence networks. In influence networks, nodes have a choice between two op-tions A and B, and each node prefers to end up choosing t...
Additivity,Subadditivity,and the Use of Visual Information:A Reply to Massaro (1988)
Additivity Subadditivity Visual Information: Massaro
font style='font-size:12px;'>
2015/8/13
Previously we (Bruno & Cutting, 1988) explored the perception of spatial relations among objects laid out in a computer-generated environment. In his commentary on our article, Massaro (1988)raised se...
An Information-Theoretic Proof of Hadamard’s Inequality
Information-Theoretic Proof Hadamard’s Inequality
font style='font-size:12px;'>
2015/8/12
An Information-Theoretic Proof of Hadamard’s Inequality.
Discovering and Using Implicit Data for Information Retrieval
Contextual Translation Implicit Data Information Retrieval Language Model Missing information Relevance Model
font style='font-size:12px;'>
2014/12/18
In real-world information retrieval (IR) tasks, the searched items and/or the users' queries often have implicit information associated with them -- information that describes unspecified aspects of t...
Retrieval and Evaluation Techniquesfor Personal Information
Information Retrieval Personal Information Management
font style='font-size:12px;'>
2014/12/18
Providing an effective mechanism for personal information retrieval is important for many applications, and requires different techniques than have been developed for general web search. This thesis f...
Resource-Bounded Information Acquisition and Learning
Information Acquisition Information Extraction Machine Learning
font style='font-size:12px;'>
2014/12/18
In many scenarios it is desirable to augment existing data with information acquired from an external source. For example, information from the Web can be used to fill missing values in a database or ...
Information Retrieval with Query Hypergraphs
information retrieval query hypergraph
font style='font-size:12px;'>
2014/12/18
Current information retrieval models are optimized for retrieval with short keyword queries. In contrast, in this dissertation we focus on longer, verbose queries with more complex structure that are ...
Exploring Privacy and Personalization in Information Retrieval Applications
information retrieval personalization privacy web search
font style='font-size:12px;'>
2014/12/18
A growing number of information retrieval applications rely on search behavior aggregated over many users. If aggregated data such as search query reformulations is not handled properly, it can allow ...
Query-Time Optimization Techniques for Structured Queries in Information Retrieval
algorithms information retrieval optimization search
font style='font-size:12px;'>
2014/12/18
The use of information retrieval (IR) systems is evolving towards larger, more complicated queries. Both the IR industrial and research communities have generated significant evidence indicating that ...