Sciweavers

2244 search results - page 169 / 449
» Subjective Document Classification Using Network Analysis
Sort
View
IV
2007
IEEE
144views Visualization» more  IV 2007»
15 years 8 months ago
Evaluating an InfoVis Technique Using Insight Reports
The evaluation of Information Visualization (InfoVis) techniques can help to identify specific strengths and weaknesses of these methods. The following article describes the resu...
Markus Rester, Margit Pohl, Sylvia Wiltner, Klaus ...
163
Voted
SIGIR
2012
ACM
13 years 4 months ago
Building reputation and trust using federated search and opinion mining
The term online reputation addresses trust relationships amongst agents in dynamic open systems. These can appear as ratings, recommendations, referrals and feedback. Several repu...
Somayeh Khatiban
ICICS
2005
Springer
15 years 7 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
125
Voted
ICPR
2008
IEEE
15 years 8 months ago
Grading nuclear pleomorphism on histological micrographs
A mainstay in cancer diagnostics is the classification or grading of cell nuclei based on their appearance. While the analysis of cytological samples has been automated successful...
Eric Cosatto, Matthew Miller, Hans Peter Graf, Joh...
MSR
2006
ACM
15 years 8 months ago
Detecting similar Java classes using tree algorithms
Similarity analysis of source code is helpful during development to provide, for instance, better support for code reuse. Consider a development environment that analyzes code whi...
Tobias Sager, Abraham Bernstein, Martin Pinzger, C...