Sciweavers

1830 search results - page 313 / 366
» Implementing a Tamper-Evident Database System
Sort
View
COMAD
2009
15 years 1 months ago
When to Trigger Active Rules?
Active rules model and enforce enterprise requirements such as situation monitoring using events, conditions and actions. These rules are termed active rules as they make the unde...
Raman Adaikkalavan, Sharma Chakravarthy
100
Voted
RECSYS
2010
ACM
15 years 25 days ago
Recommending based on rating frequencies
Since the development of the comparably simple neighborhood-based methods in the 1990s, a plethora of techniques has been developed to improve various aspects of collaborative fil...
Fatih Gedikli, Dietmar Jannach
IJSI
2008
115views more  IJSI 2008»
15 years 18 days ago
Towards Knowledge Acquisition from Semi-Structured Content
Abstract A rich family of generic Information Extraction (IE) techniques have been developed by researchers nowadays. This paper proposes WebKER, a system for automatically extract...
Xi Bai, Jigui Sun, Haiyan Che, Lian Shi
85
Voted
COLING
2002
15 years 13 days ago
A Methodology for Terminology-based Knowledge Acquisition and Integration
In this paper we propose an integrated knowledge management system in which terminology-based knowledge acquisition, knowledge integration, and XML-based knowledge retrieval are c...
Hideki Mima, Sophia Ananiadou, Goran Nenadic, Jun-...
KDD
2007
ACM
152views Data Mining» more  KDD 2007»
16 years 1 months ago
A framework for classification and segmentation of massive audio data streams
In recent years, the proliferation of VOIP data has created a number of applications in which it is desirable to perform quick online classification and recognition of massive voi...
Charu C. Aggarwal