Sciweavers

10301 search results - page 1958 / 2061
» informs 2007
Sort
View
140
Voted
KES
2007
Springer
15 years 6 months ago
Inductive Concept Retrieval and Query Answering with Semantic Knowledge Bases Through Kernel Methods
This work deals with the application of kernel methods to structured relational settings such as semantic knowledge bases expressed in Description Logics. Our method integrates a n...
Nicola Fanizzi, Claudia d'Amato
106
Voted
CHI
2007
ACM
16 years 1 months ago
Why we tag: motivations for annotation in mobile and online media
Why do people tag? Users have mostly avoided annotating media such as photos ? both in desktop and mobile environments ? despite the many potential uses for annotations, including...
Morgan Ames, Mor Naaman
94
Voted
CHI
2007
ACM
16 years 1 months ago
Storytelling alice motivates middle school girls to learn computer programming
We describe Storytelling Alice, a programming environment that introduces middle school girls to computer programming as a means to the end of creating 3D animated stories. Storyt...
Caitlin Kelleher, Randy F. Pausch, Sara B. Kiesler
126
Voted
CAISE
2007
Springer
15 years 6 months ago
Declarative XML Data Cleaning with XClean
Data cleaning is the process of correcting anomalies in a data source, that may for instance be due to typographical errors, or duplicate representations of an entity. It is a cruc...
Melanie Weis, Ioana Manolescu
107
Voted
ISW
2007
Springer
15 years 6 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...
« Prev « First page 1958 / 2061 Last » Next »