Sciweavers

1407 search results - page 229 / 282
» Systems Theory Model for Information Security
Sort
View
CIKM
2009
Springer
15 years 8 months ago
Learning to rank from Bayesian decision inference
Ranking is a key problem in many information retrieval (IR) applications, such as document retrieval and collaborative filtering. In this paper, we address the issue of learning ...
Jen-Wei Kuo, Pu-Jen Cheng, Hsin-Min Wang
SIGIR
2003
ACM
15 years 6 months ago
Table extraction using conditional random fields
The ability to find tables and extract information from them is a necessary component of data mining, question answering, and other information retrieval tasks. Documents often c...
David Pinto, Andrew McCallum, Xing Wei, W. Bruce C...
ECCV
2002
Springer
16 years 3 months ago
A Markov Chain Monte Carlo Approach to Stereovision
We propose Markov chain Monte Carlo sampling methods to address uncertainty estimation in disparity computation. We consider this problem at a postprocessing stage, i.e. once the d...
Julien Sénégas
ICSE
2008
IEEE-ACM
16 years 2 months ago
Automatic modularity conformance checking
According to Parnas's information hiding principle and Baldwin and Clark's design rule theory, the key step to decomposing a system into modules is to determine the desi...
Sunny Huynh, Yuanfang Cai, Yuanyuan Song, Kevin J....
ICSE
2008
IEEE-ACM
16 years 1 months ago
The economy of collective attention for situated knowledge collaboration in software development
Because the knowledge required for the construction of a complex software system is often widely distributed among its members, programmers routinely engage in collaboration with ...
Yunwen Ye, Kumiyo Nakakoji, Yasuhiro Yamamoto