Sciweavers

372 search results - page 23 / 75
» A Reference Model for Firewall Technology
Sort
View
CIKM
2010
Springer
15 years 15 days ago
Who should I cite: learning literature search models from citation behavior
Scientists depend on literature search to find prior work that is relevant to their research ideas. We introduce a retrieval model for literature search that incorporates a wide ...
Steven Bethard, Dan Jurafsky
ESAW
2000
Springer
15 years 5 months ago
Models of Coordination
While software is becoming decomposed in more and more finegrained entities, the interactions amongst those become of major importance. While methodologies for building such compon...
Robert Tolksdorf
ASWC
2009
Springer
14 years 11 months ago
LODE: Linking Open Descriptions of Events
People conventionally refer to an action or occurrence taking place at a certain time at a specific location as an event. This notion is potentially useful for connecting individua...
Ryan Shaw, Raphaël Troncy, Lynda Hardman
SEMWEB
2009
Springer
15 years 6 months ago
A New Perspective on Semantics of Data Provenance
: Data Provenance refers to the “origin”, “lineage”, and “source” of data. In this work, we examine provenance from a semantics perspective and present the W7 model, an...
Sudha Ram, Jun Liu
SIGIR
2012
ACM
13 years 4 months ago
Top-k learning to rank: labeling, ranking and evaluation
In this paper, we propose a novel top-k learning to rank framework, which involves labeling strategy, ranking model and evaluation measure. The motivation comes from the difficul...
Shuzi Niu, Jiafeng Guo, Yanyan Lan, Xueqi Cheng