Sciweavers

1519 search results - page 265 / 304
» A Search Log-Based Approach to Evaluation
Sort
View
WWW
2011
ACM
13 years 3 months ago
A middleware for securing mobile mashups
Mashups on traditional desktop devices are a well-known source of security risks. In this paper, we examine how these risks translate to mobile mashups and identify new risks caus...
Florent Batard, Karima Boudaoud, Michel Riveill
IHI
2010
169views Healthcare» more  IHI 2010»
13 years 3 months ago
Dynamic scheduling of emergency department resources
The processes carried out in a hospital emergency department can be thought of as structures of activities that require resources in order to execute. Costs are reduced when resou...
Junchao Xiao, Leon J. Osterweil, Qing Wang
JDIM
2010
156views more  JDIM 2010»
13 years 3 months ago
Rule based Autonomous Citation Mining with TIERL
: Citations management is an important task in managing digital libraries. Citations provide valuable information e.g., used in evaluating an author's influences or scholarly ...
Muhammad Tanvir Afzal, Hermann A. Maurer, Wolf-Til...
SIGKDD
2010
125views more  SIGKDD 2010»
13 years 3 months ago
A framework for mining interesting pattern sets
This paper suggests a framework for mining subjectively interesting pattern sets that is based on two components: (1) the encoding of prior information in a model for the data min...
Tijl De Bie, Kleanthis-Nikolaos Kontonasios, Eirin...
GECCO
2010
Springer
172views Optimization» more  GECCO 2010»
14 years 1 months ago
Designing better fitness functions for automated program repair
Evolutionary methods have been used to repair programs automatically, with promising results. However, the fitness function used to achieve these results was based on a few simpl...
Ethan Fast, Claire Le Goues, Stephanie Forrest, We...