Sciweavers

5575 search results - page 1021 / 1115
» Information Extraction
Sort
View
IEPOL
2010
130views more  IEPOL 2010»
14 years 8 months ago
Piracy or promotion? The impact of broadband Internet penetration on DVD sales
ABSTRACT Digital computer networks represent a disruptive technology, with the potential to create or destroy economic value in established industries. These opportunities and chal...
Michael D. Smith, Rahul Telang
IM
2007
14 years 11 months ago
Cluster Generation and Labeling for Web Snippets: A Fast, Accurate Hierarchical Solution
This paper describes Armil, a meta-search engine that groups the web snippets returned by auxiliary search engines into disjoint labeled clusters. The cluster labels generated by A...
Filippo Geraci, Marco Pellegrini, Marco Maggini, F...
DAC
2008
ACM
15 years 1 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran
SPRINGSIM
2008
15 years 22 days ago
Implementation by simulation; strategies for ultrasound screening for hip dysplasia in the Netherlands
Background: Implementation of medical interventions may vary with organization and available capacity. The influence of this source of variability on the cost-effectiveness can be...
Sabrina Ramwadhdoebe, Godefridus G. van Merode, Ma...
EDM
2009
184views Data Mining» more  EDM 2009»
14 years 9 months ago
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...
« Prev « First page 1021 / 1115 Last » Next »