Sciweavers

1629 search results - page 305 / 326
» A Study of Malcode-Bearing Documents
Sort
View
BPM
2008
Springer
164views Business» more  BPM 2008»
13 years 9 months ago
Analyzing Business Continuity through a Multi-layers Model
Business Continuity Management (BCM) is a process to manage risks, emergencies, and recovery plans of an organization during a crisis. It results in a document called Business Cont...
Yudistira Asnar, Paolo Giorgini
GROUP
2007
ACM
13 years 9 months ago
From plans to planning: the case of nursing plans
Drawing on a critical perspective stemming from socially informed studies of medicine, we analyze an ongoing effort to establish electronic nursing plans at the university hospita...
Glenn Munkvold, Gunnar Ellingsen, Eric Monteiro
APVIS
2008
13 years 9 months ago
Interactive Storyboard for Overall Time-Varying Data Visualization
Large amounts of time-varying datasets create great challenges for users to understand and explore them. This paper proposes an efficient visualization method for observing overal...
Aidong Lu, Han-Wei Shen
COLING
2008
13 years 9 months ago
Verification and Implementation of Language-Based Deception Indicators in Civil and Criminal Narratives
Our goal is to use natural language processing to identify deceptive and nondeceptive passages in transcribed narratives. We begin by motivating an analysis of language-based dece...
Joan Bachenko, Eileen Fitzpatrick, Michael Schonwe...
LREC
2010
107views Education» more  LREC 2010»
13 years 9 months ago
Is my Judge a good One?
This paper aims at measuring the reliability of judges in MT evaluation. The scope is two evaluation campaigns from the CESTA project, during which human evaluations were carried ...
Olivier Hamon