Sciweavers

220 search results - page 27 / 44
» Strategic Intelligence Analysis: From Information Processing...
Sort
View
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
15 years 4 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
ESWA
2008
169views more  ESWA 2008»
14 years 9 months ago
Predicting opponent's moves in electronic negotiations using neural networks
Electronic negotiation experiments provide a rich source of information about relationships between the negotiators, their individual actions, and the negotiation dynami...
Réal Carbonneau, Gregory E. Kersten, Rustam...
WWW
2005
ACM
15 years 10 months ago
Learning domain ontologies for Web service descriptions: an experiment in bioinformatics
The reasoning tasks that can be performed with semantic web service descriptions depend on the quality of the domain ontologies used to create these descriptions. However, buildin...
Marta Sabou, Chris Wroe, Carole A. Goble, Gilad Mi...
IUI
2006
ACM
15 years 3 months ago
SWISH: semantic analysis of window titles and switching history
Information workers are often involved in multiple tasks and activities that they must perform in parallel or in rapid succession. In consequence, task management itself becomes y...
Nuria Oliver, Greg Smith, Chintan Thakkar, Arun C....
EPIA
2009
Springer
15 years 1 months ago
Topic-Related Polarity Classification of Blog Sentences
Though polarity classification has been extensively explored at various text levels and domains, there has been only comparatively little work looking into topic-related polarity c...
Michael Wiegand, Dietrich Klakow