Sciweavers

556 search results - page 85 / 112
» Ontology construction for information classification
Sort
View
IJNSEC
2006
112views more  IJNSEC 2006»
14 years 11 months ago
An Access Control System with Time-constraint Using Support Vector Machines
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao
IJISMD
2010
135views more  IJISMD 2010»
14 years 9 months ago
On the Usage of Labels and Icons in Business Process Modeling
The value of business process models is dependent not only on the choice of graphical elements in the model, but also on their annotation with additional textual and graphical inf...
Jan Mendling, Jan Recker, Hajo A. Reijers
CVPR
2009
IEEE
15 years 3 months ago
ImageNet: A large-scale hierarchical image database
The explosion of image data on the Internet has the potential to foster more sophisticated and robust models and algorithms to index, retrieve, organize and interact with images a...
Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai...
CHI
2008
ACM
16 years 5 days ago
Feasibility and pragmatics of classifying working memory load with an electroencephalograph
A reliable and unobtrusive measurement of working memory load could be used to evaluate the efficacy of interfaces and to provide real-time user-state information to adaptive syst...
David B. Grimes, Desney S. Tan, Scott E. Hudson, P...
CHI
2006
ACM
16 years 5 days ago
Using hybrid networks for the analysis of online software development communities
Social network-based systems usually suffer from two major limitations: they tend to rely on a single data source (e.g. email traffic), and the form of network patterns is often p...
Yevgeniy Eugene Medynskiy, Nicolas Ducheneaut, Aym...