Sciweavers

240 search results - page 42 / 48
» Usability Issues in Data Mining Systems
Sort
View
JCDL
2006
ACM
133views Education» more  JCDL 2006»
15 years 3 months ago
Repository software evaluation using the audit checklist for certification of trusted digital repositories
The NDIIPP ECHO DEPository project [1] digital repository evaluation will use an augmented version of the draft Audit Checklist for Certification of Trusted Digital Repositories (...
Joanne Kaczmarek, Thomas G. Habing, Janet Eke
JCDL
2004
ACM
170views Education» more  JCDL 2004»
15 years 3 months ago
Looking for new, not known music only: music retrieval by melody style
With the growth of digital music, content-based music retrieval (CBMR) has attracted increasingly attention. For most CBMR systems, the task is to return music objects similar to ...
Fang-Fei Kuo, Man-Kwan Shan
JCST
2011
89views more  JCST 2011»
14 years 4 months ago
Software Defect Detection with Rocus
Software defect detection aims to automatically identify defective software modules for efficient software test in order to improve the quality of a software system. Although many...
Yuan Jiang, Ming Li, Zhi-Hua Zhou
LAWEB
2003
IEEE
15 years 2 months ago
Finding Buying Guides with a Web Carnivore
Research on buying behavior indicates that buying guides perform an important role in the overall buying process. However, while many buying guides can be found on the Web, findin...
Reiner Kraft, Raymie Stata
81
Voted
IJNSEC
2008
115views more  IJNSEC 2008»
14 years 9 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti