Sciweavers

2878 search results - page 538 / 576
» Analyzing the Uses of a Software Modeling Tool
Sort
View
ACL
2010
14 years 11 months ago
Hunting for the Black Swan: Risk Mining from Text
In the business world, analyzing and dealing with risk permeates all decisions and actions. However, to date, risk identification, the first step in the risk management cycle, has...
Jochen L. Leidner, Frank Schilder
CSCW
2008
ACM
15 years 1 months ago
Context-linked virtual assistants for distributed teams: an astrophysics case study
There is a growing need for distributed teams to analyze complex and dynamic data streams and make critical decisions under time pressure. Via a case study, we discuss potential g...
Sarah S. Poon, Rollin C. Thomas, Cecilia R. Aragon...
CCS
2008
ACM
15 years 3 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
ICEGOV
2009
ACM
14 years 11 months ago
A web-based performance monitoring system for e-government services
An e-Government portal represents not only a reputable public image of the sovereignty of a region, it is responsible for serving many users from local citizens and beyond, in a r...
Simon Fong, Ho Si Meng
BMCBI
2006
169views more  BMCBI 2006»
15 years 1 months ago
Machine learning techniques in disease forecasting: a case study on rice blast prediction
Background: Diverse modeling approaches viz. neural networks and multiple regression have been followed to date for disease prediction in plant populations. However, due to their ...
Rakesh Kaundal, Amar S. Kapoor, Gajendra P. S. Rag...