Sciweavers

1625 search results - page 232 / 325
» Intentionality
Sort
View
APNOMS
2006
Springer
15 years 8 months ago
A Seamless Service Management with Context-Aware Handoff Scheme in Ubiquitous Computing Environment
Abstract. Despite the importance of seamless connectivity in ubiquitous computing, research for seamless connectivity has not been considered properly. To provide seamless connecti...
Tae-Hoon Kang, Chung-Pyo Hong, Won-Joo Jang, Shin-...
AUSDM
2006
Springer
112views Data Mining» more  AUSDM 2006»
15 years 8 months ago
The Scamseek Project - Text Mining for Financial Scams on the Internet
The Scamseek project, as commissioned by ASIC has the principal objective of building an industrially viable system that retrieves potential scam candidate documents from the Inte...
Jon Patrick
CAISE
2006
Springer
15 years 8 months ago
Deviational Analyses for Validating Regulations on Real Systems
Deviational analysis is a traditional way of exploring the safety of systems. The results of deviational analysis contribute to traditional safety cases and safety arguments. We ex...
Fiona Polack, Thitima Srivatanakul, Tim Kelly, Joh...
CIKM
2006
Springer
15 years 8 months ago
Re-ranking search results using query logs
This work addresses two common problems in search, frequently occurring with underspecified user queries: the top-ranked results for such queries may not contain documents relevan...
Ziming Zhuang, Silviu Cucerzan
CIKM
2006
Springer
15 years 8 months ago
Privacy preserving sequential pattern mining in distributed databases
Research in the areas of privacy preserving techniques in databases and subsequently in privacy enhancement technologies have witnessed an explosive growth-spurt in recent years. ...
Vishal Kapoor, Pascal Poncelet, François Tr...