Sciweavers

1629 search results - page 284 / 326
» A Study of Malcode-Bearing Documents
Sort
View
HICSS
2003
IEEE
182views Biometrics» more  HICSS 2003»
14 years 1 months ago
Business Intelligence Explorer: A Knowledge Map Framework for Discovering Business Intelligence on the Web
Nowadays, information overload hinders the discovery of business intelligence on the World Wide Web. Existing business intelligence tools suffer from a lack of analysis and visual...
Wingyan Chung, Hsinchun Chen, Jay F. Nunamaker
AMKM
2003
Springer
14 years 28 days ago
Integrating External Sources in a Corporate Semantic Web Managed by a Multi-agent System
We first describe a multi-agent system managing a corporate memory in the form of a corporate semantic web. We then focus on a newly introduced society of agents in charge of wrap...
Tuan-Dung Cao, Fabien Gandon
ASPLOS
2010
ACM
14 years 25 days ago
Modeling GPU-CPU workloads and systems
Heterogeneous systems, systems with multiple processors tailored for specialized tasks, are challenging programming environments. While it may be possible for domain experts to op...
Andrew Kerr, Gregory F. Diamos, Sudhakar Yalamanch...
SIGMOD
2010
ACM
217views Database» more  SIGMOD 2010»
14 years 16 days ago
Mining knowledge from databases: an information network analysis approach
Most people consider a database is merely a data repository that supports data storage and retrieval. Actually, a database contains rich, inter-related, multi-typed data and infor...
Jiawei Han, Yizhou Sun, Xifeng Yan, Philip S. Yu
APN
2010
Springer
14 years 15 days ago
Wendy: A Tool to Synthesize Partners for Services
Service-oriented computing proposes services as building blocks which can be composed to complex systems. To reason about the correctness of a service, its communication protocol n...
Niels Lohmann, Daniela Weinberg