Sciweavers

3180 search results - page 545 / 636
» Knowledge-based Document Analysis
Sort
View
164
Voted
GRID
2007
Springer
15 years 3 months ago
The Requirements of Using Provenance in e-Science Experiments
In e-Science experiments, it is vital to record the experimental process for later use such as in interpreting results, verifying that the correct process took place or tracing whe...
Simon Miles, Paul T. Groth, Miguel Branco, Luc Mor...
SIGIR
2008
ACM
15 years 3 months ago
Bilingual topic aspect classification with a few training examples
This paper explores topic aspect (i.e., subtopic or facet) classification for English and Chinese collections. The evaluation model assumes a bilingual user who has found document...
Yejun Wu, Douglas W. Oard
JSS
2002
90views more  JSS 2002»
15 years 3 months ago
Producing reliable software: an experiment
A customer of high assurance software recently sponsored a software engineering experiment in which a small real-time software system was developed concurrently by two popular sof...
Carol Smidts, Xin Huang, James C. Widmaier
125
Voted
IJHCI
2010
144views more  IJHCI 2010»
15 years 2 months ago
Naturalistic Decision Making for Power System Operators
Motivation – Investigations of large-scale outages in the North American interconnected electric system often attribute the causes to three T’s: Trees, Training and Tools. To ...
Frank L. Greitzer, Robin Podmore, Marck Robinson, ...
KBSE
2010
IEEE
15 years 2 months ago
Analyzing security architectures
We present a semi-automated approach, Secoria, for analyzing a security runtime architecture for security and for conformance to an object-oriented implementation. Typecheckable a...
Marwan Abi-Antoun, Jeffrey M. Barnes