Sciweavers

69
Voted
INFORMATICASI
2010
14 years 8 months ago
Using Bagging and Boosting Techniques for Improving Coreference Resolution
Smita Vemulapalli, Xiaoqiang Luo, John F. Pitrelli...
71
Voted
INFORMATICASI
2010
14 years 8 months ago
Using Meta-Structures in Database Design
Hui Ma, René Noack, Klaus-Dieter Schewe, Be...
77
Voted
INFORMATICASI
2010
14 years 8 months ago
Earth Observation Data Processing in Distributed Systems
Dana Petcu, Silviu Panica, Marian Neagul, Marc Fr&...
94
Voted
INFORMATICASI
2010
14 years 8 months ago
Cryptanalysis of a Simple Three-party Key Exchange Protocol
Debiao He, Jianhua Chen, Jin Hu
102
Voted
INFORMATICASI
2010
14 years 8 months ago
Strategic Modeling of Information Sharing among Data Privacy Attackers
Research in privacy-preserving data publishing has revealed the necessity of accounting for an adversary's background knowledge when reasoning about the protection afforded b...
Quang Duong, Kristen LeFevre, Michael P. Wellman
75
Voted
INFORMATICASI
2010
14 years 8 months ago
Context-based Global Expertise in Recommendation Systems
Vincenza Carchiolo, Vincenza Longheu, Michele Malg...
72
Voted
INFORMATICASI
2010
14 years 8 months ago
Automatic Identification of Lexical Units
Vidas Daudaravicius
90
Voted
INFORMATICASI
2010
14 years 8 months ago
Planning to Discover and Counteract Attacks
Recognizing attack plans is one of the goals of security analysts. Attack plan recognition is critical for predicting future actions of attackers, generating possible actions (i.e...
Tatiana Kichkaylo, Tatyana Ryutov, Michael D. Oros...
50
Voted
INFORMATICASI
2010
14 years 8 months ago
A Service Oriented Framework for Natural Language Text Enrichment
Tadej Stajner, Delia Rusu, Lorand Dali, Blaz Fortu...