Sciweavers

1629 search results - page 186 / 326
» A Study of Malcode-Bearing Documents
Sort
View
PODS
2005
ACM
109views Database» more  PODS 2005»
14 years 9 months ago
XPath satisfiability in the presence of DTDs
We study the satisfiability problem associated with XPath in the presence of DTDs. This is the problem of determining, given a query p in an XPath fragment and a DTD D, whether or...
Michael Benedikt, Wenfei Fan, Floris Geerts
SDM
2009
SIAM
140views Data Mining» more  SDM 2009»
14 years 6 months ago
Straightforward Feature Selection for Scalable Latent Semantic Indexing.
Latent Semantic Indexing (LSI) has been validated to be effective on many small scale text collections. However, little evidence has shown its effectiveness on unsampled large sca...
Jun Yan, Shuicheng Yan, Ning Liu, Zheng Chen
CHI
2010
ACM
14 years 4 months ago
ToolClips: an investigation of contextual video assistance for functionality understanding
We investigate the use of on-line contextual video assistance to improve the learnability of software functionality. After discussing motivations and design goals for such forms o...
Tovi Grossman, George W. Fitzmaurice
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
14 years 4 months ago
Using Knowledge Management Systems to Structure Knowledgeable Practices
The purpose of this study is to explore the role of knowledge management systems (KMS) in structuring knowledgeable practices within organizations. Specifically, we consider how i...
Chad Saunders, Mike Chiasson
IEEEIAS
2009
IEEE
14 years 3 months ago
Organizational Barriers to the Implementation of Security Engineering
: The link between security engineering and systems engineering exists at the earliest stage of systems development, and, as a whole, there is sufficient evidence to suggest the di...
Bryan Stewart Cline