Sciweavers

3193 search results - page 575 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
ICCD
1995
IEEE
109views Hardware» more  ICCD 1995»
14 years 17 days ago
Verifying the performance of the PCI local bus using symbolic techniques
Symbolic model checking is a successful technique for checking properties of large finite-state systems. This method has been used to verify a number of real-world hardware desig...
Sérgio Vale Aguiar Campos, Edmund M. Clarke...
WWW
2003
ACM
14 years 9 months ago
?-Queries: enabling querying for semantic associations on the semantic web
This paper presents the notion of Semantic Associations as complex relationships between resource entities. These relationships capture both a connectivity of entities as well as ...
Kemafor Anyanwu, Amit P. Sheth
ICDM
2007
IEEE
276views Data Mining» more  ICDM 2007»
14 years 3 months ago
SOPS: Stock Prediction Using Web Sentiment
Recently, the web has rapidly emerged as a great source of financial information ranging from news articles to personal opinions. Data mining and analysis of such financial info...
Vivek Sehgal, Charles Song
SIGIR
2009
ACM
14 years 3 months ago
Temporal collaborative filtering with adaptive neighbourhoods
Recommender Systems, based on collaborative filtering (CF), aim to accurately predict user tastes, by minimising the mean error achieved on hidden test sets of user ratings, afte...
Neal Lathia, Stephen Hailes, Licia Capra
CIKM
2008
Springer
13 years 11 months ago
Joke retrieval: recognizing the same joke told differently
In a corpus of jokes, a human might judge two documents to be the "same joke" even if characters, locations, and other details are varied. A given joke could be retold w...
Lisa Friedland, James Allan