Sciweavers

1969 search results - page 283 / 394
» Incremental Processing and Acceptability
Sort
View
WWW
2009
ACM
16 years 6 months ago
Why is the web loosely coupled?: a multi-faceted metric for service design
Loose coupling is often quoted as a desirable property of systems architectures. One of the main goals of building systems using Web technologies is to achieve loose coupling. How...
Cesare Pautasso, Erik Wilde
WWW
2005
ACM
16 years 6 months ago
Named graphs, provenance and trust
The Semantic Web consists of many RDF graphs nameable by URIs. This paper extends the syntax and semantics of RDF to cover such Named Graphs. This enables RDF statements that desc...
Jeremy J. Carroll, Christian Bizer, Patrick J. Hay...
CHI
2009
ACM
16 years 6 months ago
Why and why not explanations improve the intelligibility of context-aware intelligent systems
Context-aware intelligent systems employ implicit inputs, and make decisions based on complex rules and machine learning models that are rarely clear to users. Such lack of system...
Brian Y. Lim, Anind K. Dey, Daniel Avrahami
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
16 years 5 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
KDD
2001
ACM
228views Data Mining» more  KDD 2001»
16 years 5 months ago
REVI-MINER, a KDD-environment for deviation detection and analysis of warranty and goodwill cost statements in automotive indust
REVI-MINER is a KDD-environment which supports the detection and analysis of deviations in warranty and goodwill cost statements. The system was developed within the framework of ...
Edgar Hotz, Udo Grimmer, W. Heuser, Gholamreza Nak...