Sciweavers

1649 search results - page 258 / 330
» Improved Matrix Interpretation
Sort
View
91
Voted
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
15 years 6 months ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas
86
Voted
WCRE
2003
IEEE
15 years 6 months ago
Reconstructing Software Architecture for J2EE Web Applications
In this paper we describe our approach to reconstructing the software architecture of J2EE web applications. We use the Siemens Four Views approach, separating the architecture in...
Minmin Han, Christine Hofmeister, Robert L. Nord
104
Voted
WISE
2003
Springer
15 years 6 months ago
Ontology Generation from Tables
At the heart of today’s information-explosion problems are issues involving semantics, mutual understanding, concept matching, and interoperability. Ontologies and the Semantic ...
Yuri A. Tijerino, David W. Embley, Deryle W. Lonsd...
104
Voted
AIME
2003
Springer
15 years 6 months ago
Attribute Interactions in Medical Data Analysis
There is much empirical evidence about the success of naive Bayesian classification (NBC) in medical applications of attribute-based machine learning. NBC assumes conditional inde...
Aleks Jakulin, Ivan Bratko, Dragica Smrke, Janez D...
115
Voted
ICDM
2002
IEEE
109views Data Mining» more  ICDM 2002»
15 years 5 months ago
Using Text Mining to Infer Semantic Attributes for Retail Data Mining
Current Data Mining techniques usually do not have a mechanism to automatically infer semantic features inherent in the data being “mined”. The semantics are either injected i...
Rayid Ghani, Andrew E. Fano