Sciweavers

2250 search results - page 158 / 450
» Authorizing applications in singularity
Sort
View
FEGC
2008
104views Biometrics» more  FEGC 2008»
14 years 11 months ago
Mining Implications from Lattices of Closed Trees
We propose a way of extracting high-confidence association rules from datasets consisting of unlabeled trees. The antecedents are obtained through a computation akin to a hypergrap...
José L. Balcázar, Albert Bifet, Anto...
86
Voted
MKWI
2008
169views Business» more  MKWI 2008»
14 years 11 months ago
A Portal for Cross-Administrative Acquisition and Specification of Software Requirements
: For the development of software requirements within a team, efficient communication and a systematic approach are necessary. Because of the complexity of the task, the need for s...
Norman Riegel, Holger Branding, Michael Geisser, T...
ACL
2003
14 years 11 months ago
Probabilistic Text Structuring: Experiments with Sentence Ordering
Ordering information is a critical task for natural language generation applications. In this paper we propose an approach to information ordering that is particularly suited for ...
Mirella Lapata
76
Voted
ICEB
2004
167views Business» more  ICEB 2004»
14 years 11 months ago
Investigating the Use of the Business Model Concept through Interviews
The term business model is widely used and is increasingly gaining importance as a business concept and management tool, particularly in e-business. Several authors propose the ap...
Alexander Osterwalder, Yves Pigneur
ECIS
2001
14 years 11 months ago
Towards More Professional Information Systems Development: ISD as Knowledge Work
The purpose of this paper is to argue that research and practice of ISD could substantially benefit from interpreting ISD as knowledge work. Two distinct areas of competence are i...
Juhani Iivari, Rudy Hirschheim, Heinz K. Klein