Sciweavers

1012 search results - page 142 / 203
» Testing documentation with
Sort
View
CIIT
2004
132views Communications» more  CIIT 2004»
14 years 11 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol
SIGMOD
1997
ACM
148views Database» more  SIGMOD 1997»
15 years 1 months ago
Beyond Market Baskets: Generalizing Association Rules to Correlations
One of the most well-studied problems in data mining is mining for association rules in market basket data. Association rules, whose significance is measured via support and confi...
Sergey Brin, Rajeev Motwani, Craig Silverstein
ENVSOFT
2006
144views more  ENVSOFT 2006»
14 years 9 months ago
Ten iterative steps in development and evaluation of environmental models
Models are increasingly being relied upon to inform and support natural resource management. They are incorporating an ever broader range of disciplines and now often confront peo...
Anthony J. Jakeman, Rebecca A. Letcher, John P. No...
CIKM
1999
Springer
15 years 2 months ago
A Unified Environment for Fusion of Information Retrieval Approaches
Prior work has shown that combining results of various retrieval approaches and query representations can improve search effectiveness. Today, many meta-search engines exist which...
M. Catherine McCabe, Abdur Chowdhury, David A. Gro...
66
Voted
WWW
2008
ACM
15 years 10 months ago
Investigation of partial query proximity in web search
Proximity of query terms in a document is an important criterion in IR. However, no investigation has been made to determine the most useful term sequences for which proximity sho...
Jing Bai, Yi Chang, Hang Cui, Zhaohui Zheng, Gordo...