: The paper proposes a different approach to data modeling. Analogous to the rejection method, where the misclassifications are removed and manually evaluated, we focus here on dif...
In this paper we propose a model for relevance feedback. Our model combines evidence from user's relevance assessments with algorithms describing how words are used within do...
This research throws light on to the role of social issues in developing a successful information system. In a case study of a community health organization, we describe how IT ma...
Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric key setting. Information theoretic bounds on the success probability...
Program information extracted from source codes is valuable for research in many software engineering fields. Many program analysis tools in these fields usually share some common...
Wanghong Yuan, X. Chen, Tao Xie, Hong Mei, Fuqing ...