![]() ![]() ![]() | ![]() |
![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Note: Links lead to the DBLP on the Web. Rebecca Cathey Rebecca Cathey, Ling Ma , Nazli Goharian , David A. Grossman : Misuse detection for information retrieval systems. CIKM 2003 : 183-190 Rebecca Cathey, Ling Ma , Nazli Goharian , David A. Grossman : Misuse Detection for Information Retrieval Systems: A Preliminary Approach. PDPTA 2003 : 580-583 1 [ 1 ] [ 2 ] 2 [ 1 ] [ 2 ] 3 [ 1 ] [ 2 ] ![]() ©2004 Association for Computing Machinery |