This paper reports on the user-centered design methodology and techniques used for the elicitation of user requirements and how these requirements informed the first phase of the ...
Preben Hansen, Daniela Petrelli, Jussi Karlgren, M...
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Language Modeling (LM) has been successfully applied to Information Retrieval (IR). However, most of the existing LM approaches only rely on term occurrences in documents, queries...
Jing Bai, Dawei Song, Peter Bruza, Jian-Yun Nie, G...
With the growth of interest on the web services, people pay increasingly attention to the choreography, that is, to describe collaborations of participants in accomplishing a comm...
Zongyan Qiu, Xiangpeng Zhao, Chao Cai, Hongli Yang
As an alternative to previous studies on extracting class attributes from unstructured text, which consider either Web documents or query logs as the source of textual data, A boo...