Sciweavers

21319 search results - page 4108 / 4264
» An Approach for Method Reengineering
Sort
View
138
Voted
SEMCO
2009
IEEE
15 years 10 months ago
LAIR: A Language for Automated Semantics-Aware Text Sanitization Based on Frame Semantics
—We present LAIR: A domain-specific language that enables users to specify actions to be taken upon meeting specific semantic frames in a text, in particular to rephrase and re...
Steffen Hedegaard, Søren Houen, Jakob Grue ...
PRDC
2009
IEEE
15 years 10 months ago
Quantifying Criticality of Dependability-Related IT Organization Processes in CobiT
—With ever-growing complexity of computer and communication systems analytical methods do not scale, especially with respect to dependability assessment of information technology...
Tobias Goldschmidt, Andreas Dittrich, Miroslaw Mal...
145
Voted
ICDM
2009
IEEE
109views Data Mining» more  ICDM 2009»
15 years 10 months ago
Knowledge Discovery from Citation Networks
—Knowledge discovery from scientific articles has received increasing attentions recently since huge repositories are made available by the development of the Internet and digit...
Zhen Guo, Zhongfei Zhang, Shenghuo Zhu, Yun Chi, Y...
ICDM
2009
IEEE
126views Data Mining» more  ICDM 2009»
15 years 10 months ago
Convex Non-negative Matrix Factorization in the Wild
Abstract—Non-negative matrix factorization (NMF) has recently received a lot of attention in data mining, information retrieval, and computer vision. It factorizes a non-negative...
Christian Thurau, Kristian Kersting, Christian Bau...
ICTAI
2009
IEEE
15 years 10 months ago
Preventing Unwanted Social Inferences with Classification Tree Analysis
A serious threat to user privacy in new mobile and web2.0 applications stems from ‘social inferences’. These unwanted inferences are related to the users’ identity, current ...
Sara Motahari, Sotirios G. Ziavras, Quentin Jones
« Prev « First page 4108 / 4264 Last » Next »