Sciweavers

828 search results - page 144 / 166
» A framework for spyware assessment
Sort
View
108
Voted
FLAIRS
2000
15 years 3 months ago
Fundamental Properties of the Core Matching Functions for Information Retrieval
Traditional benchmarking methods for information retrieval (IR) are based on experimental performance evaluation. Although the metrics precision and recall can measure the perform...
Dawei Song, Kam-Fai Wong, Peter Bruza, Chun Hung C...
IM
1997
15 years 3 months ago
Unified Fault, Resource Management and Control in ATM-based IBCN
In this paper we present the initial specification of a system that covers both the control and management planes of network operation, with emphasis on fault, performance, and co...
Stelios Sartzetakis, Panos Georgatsos, George E. K...
AAAI
1994
15 years 3 months ago
Towards More Creative Case-Based Design Systems
Case-based reasoning (CBR) has a great deal to o er in supporting creative design, particularly processes that rely heavily on previous design experience, such as framing the prob...
Linda M. Wills, Janet L. Kolodner
DASFAA
2009
IEEE
118views Database» more  DASFAA 2009»
15 years 3 months ago
Detecting Aggregate Incongruities in XML
The problem of identifying deviating patterns in XML repositories has important applications in data cleaning, fraud detection, and stock market analysis. Current methods determine...
Wynne Hsu, Qiangfeng Peter Lau, Mong-Li Lee
HPDC
2010
IEEE
15 years 3 months ago
ParaText: scalable text modeling and analysis
Automated analysis of unstructured text documents (e.g., web pages, newswire articles, research publications, business reports) is a key capability for solving important problems ...
Daniel M. Dunlavy, Timothy M. Shead, Eric T. Stant...