Sciweavers

7960 search results - page 1509 / 1592
» Systems for Knowledge and Beliefs
Sort
View
USS
2010
14 years 9 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
CLEF
2009
Springer
14 years 9 months ago
Overview of the CLEF 2009 Large-Scale Visual Concept Detection and Annotation Task
The large-scale visual concept detection and annotation task (LS-VCDT) in ImageCLEF 2009 aims at the detection of 53 concepts in consumer photos. These concepts are structured in ...
Stefanie Nowak, Peter Dunker
ECIR
2009
Springer
14 years 9 months ago
Refining Keyword Queries for XML Retrieval by Combining Content and Structure
Abstract. The structural heterogeneity and complexity of XML repositories makes query formulation challenging for users who have little knowledge of XML. To assist its users, an XM...
Desislava Petkova, W. Bruce Croft, Yanlei Diao
EDM
2009
116views Data Mining» more  EDM 2009»
14 years 9 months ago
Determining the Significance of Item Order In Randomized Problem Sets
Researchers who make tutoring systems would like to know which sequences of educational content lead to the most effective learning by their students. The majority of data collecte...
Zachary A. Pardos, Neil T. Heffernan
EDM
2009
184views Data Mining» more  EDM 2009»
14 years 9 months ago
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...
« Prev « First page 1509 / 1592 Last » Next »