Sciweavers

108 search results - page 20 / 22
» A Knowledge-based Approach to Handling Exceptions in Workflo...
Sort
View
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
14 years 7 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
IADIS
2004
14 years 11 months ago
Web Document Classification: Managing Context Change
This paper focuses on the information management systems of the dynamic World Wide Web. Many individual web pages, such as news portals, provide periodic information and public an...
Sung Sik Park, Yang Sok Kim, Byeong Ho Kang
76
Voted
TREC
1998
14 years 10 months ago
TREC-7 Evaluation of Conceptual Interlingua Document Retrieval (CINDOR) in English and French
: TextWise LLC. participated in the TREC-7 Cross-Language Retrieval track using the CINDOR system, which utilizes a "conceptual interlingua" representation of documents a...
Anne Diekema, Farhad Oroumchian, Paraic Sheridan, ...
KDD
1998
ACM
145views Data Mining» more  KDD 1998»
15 years 1 months ago
Aggregation of Imprecise and Uncertain Information for Knowledge Discovery in Databases
We consider the problem of aggregation for uncertain and imprecise data. For such data, we define aggregation operators and use them to provide information on properties and patte...
Sally I. McClean, Bryan W. Scotney, Mary Shapcott
EOR
2007
165views more  EOR 2007»
14 years 9 months ago
Adaptive credit scoring with kernel learning methods
Credit scoring is a method of modelling potential risk of credit applications. Traditionally, logistic regression, linear regression and discriminant analysis are the most popular...
Yingxu Yang