Sciweavers

1929 search results - page 283 / 386
» A Problem Space Approach to Expert System Specification
Sort
View
138
Voted
DASFAA
2008
IEEE
137views Database» more  DASFAA 2008»
15 years 5 months ago
Efficient Mining of Recurrent Rules from a Sequence Database
We study a novel problem of mining significant recurrent rules from a sequence database. Recurrent rules have the form "whenever a series of precedent events occurs, eventuall...
David Lo, Siau-Cheng Khoo, Chao Liu 0001
122
Voted
LREC
2008
94views Education» more  LREC 2008»
15 years 5 months ago
LX-Service: Web Services of Language Technology for Portuguese
In the present paper we report on the development of a cluster of web services of language technology for Portuguese that we named as LXService. These web services permit the dire...
António Branco, Francisco Costa, Pedro Mart...
127
Voted
GI
2010
Springer
15 years 1 months ago
Reusable Interaction Protocols for Workflows
With the advent of collaborative business processes that may include different parties, the interaction means between those processes steadily gains more importance. Despite this i...
Alexander Pokahr, Lars Braubach
SIGMOD
2009
ACM
148views Database» more  SIGMOD 2009»
16 years 3 months ago
Combining keyword search and forms for ad hoc querying of databases
A common criticism of database systems is that they are hard to query for users uncomfortable with a formal query language. To address this problem, form-based interfaces and keyw...
Eric Chu, Akanksha Baid, Xiaoyong Chai, AnHai Doan...
145
Voted
TSE
2010
230views more  TSE 2010»
14 years 10 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...