Sciweavers

SAC
2005
ACM
15 years 2 months ago
On search in peer-to-peer file sharing systems
We consider the problem of information retrieval in a peerto-peer file sharing system. We assume that peers are unreliable, metadata are sparse, and queries are short. In light o...
Wai Gen Yee, Ophir Frieder
WISE
2005
Springer
15 years 2 months ago
Document Re-ranking by Generality in Bio-medical Information Retrieval
Document ranking is well known to be a crucial process in information retrieval (IR). It presents retrieved documents in an order of their estimated degrees of relevance to query. ...
Xin Yan, Xue Li, Dawei Song
IRI
2005
IEEE
15 years 2 months ago
Data integration for capital projects via community-specific conceptual representations
Although data integration has been a research subject for decades in the AEC (Architecture Engineering Construction) industry whose data is usually highly fragmented, nowadays we ...
Yimin Zhu, Mei-Ling Shyu, Shu-Ching Chen
IRI
2005
IEEE
15 years 2 months ago
Handling missing values via decomposition of the conditioned set
In this paper, a framework for replacing missing values in a database is proposed since a real-world database is seldom complete. Good data quality in a database can directly impr...
Mei-Ling Shyu, Indika Kuruppu-Appuhamilage, Shu-Ch...
IRI
2005
IEEE
15 years 2 months ago
Modeling methodology for application development in petroleum industry
The development of applications for monitoring, control, simulation and diagnosis in the petroleum industry involves a multitude of complex software tools. These tools have their ...
Cong Zhang, Viktor K. Prasanna, Abdollah Orangi, W...
IRI
2005
IEEE
15 years 2 months ago
Reusing legacy COBOL code with UML collaboration diagrams via a Wide Spectrum Language
Many legacy systems were developed in COBOL, which still play an important role in business. It is an unavoidable issue for organisations to maintain or replace these COBOL system...
Jianjun Pu, Zhuopeng Zhang, Yang Xu, Hongji Yang
IRI
2005
IEEE
15 years 2 months ago
Building reusable components with service-oriented architectures
– To build, manage and apply reusable components easily and efficiently are an ideal of software developers. Service-oriented architectures provide more hopes for reusable compon...
Haibin Zhu
IRI
2005
IEEE
15 years 2 months ago
Exploiting efficient data mining techniques to enhance intrusion detection systems
- Security is becoming a critical part of organizational information systems. Intrusion Detection System (IDS) is an important detection that is used as a countermeasure to preserv...
Chang-Tien Lu, Arnold P. Boedihardjo, Prajwal Mana...
IRI
2005
IEEE
15 years 2 months ago
A grid oriented approach to reusing legacy code in ICENI framework
Legacy systems are valuable assets for organisations. They continuously evolve with new emerged technologies in rapidly changing business environment. ICENI provided an excellent ...
Jianzhi Li, Zhuopeng Zhang, Hongji Yang