Sciweavers

1733 search results - page 204 / 347
» Critical Information Systems Research: A Habermasian Approac...
Sort
View
PROMISE
2010
14 years 8 months ago
Prediction of defect distribution based on project characteristics for proactive project management
As software has been pervasive and various software projects have been executed since the 1970s, software project management has played a significant role in software industry. Th...
Youngki Hong, Wondae Kim, Jeongsoo Joo
UIST
2009
ACM
15 years 8 months ago
Overview based example selection in end user interactive concept learning
Interaction with large unstructured datasets is difficult because existing approaches, such as keyword search, are not always suited to describing concepts corresponding to the di...
Saleema Amershi, James Fogarty, Ashish Kapoor, Des...
IWIA
2003
IEEE
15 years 6 months ago
Intrusion Detection Testing and Benchmarking Methodologies
— The ad-hoc methodology that is prevalent in today’s testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algor...
Nicholas Athanasiades, Randal Abler, John G. Levin...
SISAP
2010
IEEE
159views Data Mining» more  SISAP 2010»
14 years 12 months ago
CP-index: using clustering and pivots for indexing non-metric spaces
Most multimedia information retrieval systems use an indexing scheme to speed up similarity search. The index aims to discard large portions of the data collection at query time. ...
Victor Sepulveda, Benjamin Bustos
ICWSM
2009
14 years 11 months ago
A Categorical Model for Discovering Latent Structure in Social Annotations
The advent of social tagging systems has enabled a new community-based view of the Web in which objects like images, videos, and Web pages are annotated by thousands of users. Und...
Said Kashoob, James Caverlee, Ying Ding