Sciweavers

13 search results - page 2 / 3
» Exploration and Exploitation: Knowledge Sharing in Digital G...
Sort
View
SACMAT
2003
ACM
13 years 10 months ago
On context in authorization policy
Authorization policy infrastructures are evolving with the complex environments that they support. However, the requirements and technologies supporting context are not yet well u...
Patrick Drew McDaniel
JCDL
2006
ACM
143views Education» more  JCDL 2006»
13 years 10 months ago
Categorizing web search results into meaningful and stable categories using fast-feature techniques
When search results against digital libraries and web resources have limited metadata, augmenting them with meaningful and stable category information can enable better overviews ...
Bill Kules, Jack Kustanowitz, Ben Shneiderman
VLDB
1997
ACM
169views Database» more  VLDB 1997»
13 years 8 months ago
Mining Insurance Data at Swiss Life
Huge masses of digital data about products, customers and competitors have become available for companies in the services sector. In order to exploit its inherent (and often hidde...
Jörg-Uwe Kietz, Ulrich Reimer, Martin Staudt
CE
2007
176views more  CE 2007»
13 years 4 months ago
Pedagogical approaches for technology-integrated science teaching
The two separate projects described have examined how teachers exploit computer-based technologies in supporting learning of science at secondary level. This paper examines how pe...
Sara Hennessy, Jocelyn Wishart, Denise Whitelock, ...
KDD
1998
ACM
164views Data Mining» more  KDD 1998»
13 years 9 months ago
A Data Mining Support Environment and its Application on Insurance Data
Huge masses of digital data about products, customers and competitors have become available for companies in the services sector. In order to exploit its inherent (and often hidde...
Martin Staudt, Jörg-Uwe Kietz, Ulrich Reimer