Sciweavers

834 search results - page 107 / 167
» Research Documentation Guidelines - Capturing knowledge, imp...
Sort
View
ACSAC
2002
IEEE
15 years 4 months ago
Protecting Data from Malicious Software
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
Matthew Schmid, Frank Hill, Anup K. Ghosh
UML
1999
Springer
15 years 4 months ago
Core Meta-Modelling Semantics of UML: The pUML Approach
Abstract. The current UML semantics documentation has made a signi cant step towards providing a precise description of the UML. However, at present the semantic model it proposes ...
Andy Evans, Stuart Kent
IIWAS
2008
15 years 1 months ago
Combining content extraction heuristics: the CombinE system
The main text content of an HTML document on the WWW is typically surrounded by additional contents, such as navigation menus, advertisements, link lists or design elements. Conte...
Thomas Gottron
RIAO
2007
15 years 1 months ago
Using Prior Information Derived from Citations in Literature Search
Researchers spent a large amount of their time searching through an ever increasing number of scientific articles. Although users of scientific search engines prefer the ranking o...
Edgar Meij, Maarten de Rijke
CLIN
2004
15 years 1 months ago
Query-Based Summarization using Rhetorical Structure Theory
Research on Question Answering is focused mainly on classifying the question type and finding the answer. Presenting the answer in a way that suits the user's needs has recei...
Wauter Bosma