Sciweavers

175 search results - page 1 / 35
» Case Provenance: The Value of Remembering Case Sources
Sort
View
ICCBR
2007
Springer
13 years 10 months ago
Case Provenance: The Value of Remembering Case Sources
Case-based reasoning systems routinely record the results of prior problem-solving, but not the provenance of new cases: the way in which the new cases were derived. This paper pro...
David B. Leake, Matthew Whitehead
DSN
2008
IEEE
13 years 6 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
DEBU
2007
211views more  DEBU 2007»
13 years 4 months ago
Provenance in Databases: Past, Current, and Future
The need to understand and manage provenance arises in almost every scientific application. In many cases, information about provenance constitutes the proof of correctness of re...
Wang Chiew Tan
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
13 years 11 months ago
Quantifying IT Value Latency: The Case of the Financial Services Industry
Both the academia and practice recognize that information technology (IT) investments may not yield immediate benefits. Nevertheless, there has been a lack of methodological devel...
Kim Huat Goh, Robert J. Kauffman
CHI
2010
ACM
13 years 11 months ago
A case study of micro-blogging in the enterprise: use, value, and related issues
This is a case study about the early adoption and use of micro-blogging in a Fortune 500 company. The study used several independent data sources: five months of empirical micro-b...
Jun Zhang, Yan Qu, Jane Cody, Yulingling Wu