Sciweavers

6269 search results - page 1154 / 1254
» Turning data into knowledge
Sort
View
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 9 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
ICLP
2007
Springer
15 years 8 months ago
Web Sites Verification: An Abductive Logic Programming Tool
We present the CIFFWEB system, an innovative tool for the verification of web sites, relying upon abductive logic programming. The system allows the user to define rules that a web...
Paolo Mancarella, Giacomo Terreni, Francesca Toni
ERCIMDL
2006
Springer
204views Education» more  ERCIMDL 2006»
15 years 8 months ago
Comparing and Combining Two Approaches to Automated Subject Classification of Text
A machine-learning and a string-matching approach to automated subject classification of text were compared, as to their performance, advantages and downsides. The former approach ...
Koraljka Golub, Anders Ardö, Dunja Mladenic, ...
125
Voted
GFKL
2006
Springer
133views Data Mining» more  GFKL 2006»
15 years 8 months ago
Adaptive Conjoint Analysis for Pricing Music Downloads
Finding the right pricing for music downloads is of ample importance to the recording industry and music download service providers. For the recently introduced music downloads, re...
Christoph Breidert, Michael Hahsler
PADL
2000
Springer
15 years 8 months ago
Transformation-by-Example for XML
Abstract. xml is a language for describing markup languages for structured data. A growing number of applications that process xml documents are transformers, i.e., programs that c...
Shriram Krishnamurthi, Kathryn E. Gray, Paul T. Gr...
« Prev « First page 1154 / 1254 Last » Next »