Sciweavers

372 search results - page 23 / 75
» A Reference Model for Firewall Technology
Sort
View
CIKM
2010
Springer
13 years 6 months ago
Who should I cite: learning literature search models from citation behavior
Scientists depend on literature search to find prior work that is relevant to their research ideas. We introduce a retrieval model for literature search that incorporates a wide ...
Steven Bethard, Dan Jurafsky
ESAW
2000
Springer
13 years 11 months ago
Models of Coordination
While software is becoming decomposed in more and more finegrained entities, the interactions amongst those become of major importance. While methodologies for building such compon...
Robert Tolksdorf
ASWC
2009
Springer
13 years 5 months ago
LODE: Linking Open Descriptions of Events
People conventionally refer to an action or occurrence taking place at a certain time at a specific location as an event. This notion is potentially useful for connecting individua...
Ryan Shaw, Raphaël Troncy, Lynda Hardman
SEMWEB
2009
Springer
14 years 4 days ago
A New Perspective on Semantics of Data Provenance
: Data Provenance refers to the “origin”, “lineage”, and “source” of data. In this work, we examine provenance from a semantics perspective and present the W7 model, an...
Sudha Ram, Jun Liu
SIGIR
2012
ACM
11 years 10 months ago
Top-k learning to rank: labeling, ranking and evaluation
In this paper, we propose a novel top-k learning to rank framework, which involves labeling strategy, ranking model and evaluation measure. The motivation comes from the difficul...
Shuzi Niu, Jiafeng Guo, Yanyan Lan, Xueqi Cheng