Sciweavers

1293 search results - page 104 / 259
» Recovering conceptual models from web applications
Sort
View
WWW
2010
ACM
15 years 4 months ago
Equip tourists with knowledge mined from travelogues
With the prosperity of tourism and Web 2.0 technologies, more and more people have willingness to share their travel experiences on the Web (e.g., weblogs, forums, or Web 2.0 comm...
Qiang Hao, Rui Cai, Changhu Wang, Rong Xiao, Jiang...
ITCC
2002
IEEE
15 years 2 months ago
Recruitment Filtering with Personality-Job Fit Model
Many job applications on the web [3-4, 7-8, 10, 12] provide only simple boolean comparing using only basic requirement information (i.e., degree, age) for searching and matching j...
Surattana Supjarerndee, Yaowadee Temtanapat, Utomp...
HICSS
2002
IEEE
90views Biometrics» more  HICSS 2002»
15 years 2 months ago
Knowledge-Based IS Implementation Support: An Application to the IS Change Agent Role Problem
The threat of abandoned or extensively overhauled IS is a major concern for both MIS specialists and businesses. This concern may stem from the mismatch between MIS specialist cha...
Meral Binbasioglu, Elaine Winston
JTAER
2008
118views more  JTAER 2008»
14 years 8 months ago
Service and Document Based Interoperability for European eCustoms Solutions
Innovative eCustoms solutions play an important role in the pan-European eGovernment strategy. The underlying premise is interoperability postulating a common understanding of pro...
Tobias Vogel, Alexander Schmidt, Alexander Lemm, H...
JMLR
2010
185views more  JMLR 2010»
14 years 4 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto