Sciweavers

1332 search results - page 185 / 267
» Data Mining to Support Engineering Design Decision
Sort
View
CBMS
2008
IEEE
15 years 6 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...
116
Voted
HICSS
2002
IEEE
113views Biometrics» more  HICSS 2002»
15 years 4 months ago
Persona: A Contextualized and Personalized Web Search
Abstract— Recent advances in graph-based search techniques derived from Kleinberg’s work [1] have been impressive. This paper further improves the graph-based search algorithm ...
Francisco Tanudjaja, Lik Mu
LREC
2010
144views Education» more  LREC 2010»
15 years 1 months ago
Evaluating Complex Semantic Artifacts
Evaluating complex Natural Language Processing (NLP) systems can prove extremely difficult. In many cases, the best one can do is to evaluate these systems indirectly, by looking ...
Christopher R. Walker, Hannah Copperman
ISSRE
2008
IEEE
15 years 6 months ago
Detection and Prediction of Resource-Exhaustion Vulnerabilities
Systems connected to the Internet are highly susceptible to denial-of-service attacks that can compromise service availability, causing damage to customers and providers. Due to e...
João Antunes, Nuno Ferreira Neves, Paulo Ve...
APSEC
2007
IEEE
15 years 6 months ago
Towards Instant Automatic Model Refinement Based on OCL
Model refinement is a complex task. It is difficult for developers to refine models all by themselves. A good modeling tool should not only do routine refinement work for develope...
Hui Song, Yanchun Sun, Li Zhou, Gang Huang