Sciweavers

407 search results - page 76 / 82
» An Automated Verification Method for Distributed Systems Sof...
Sort
View
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 2 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
ICSM
2009
IEEE
14 years 2 months ago
Expert recommendation with usage expertise
Global and distributed software development increases the need to find and connect developers with relevant expertise. Existing recommendation systems typically model expertise b...
David Ma, David Schuler, Thomas Zimmermann, Jonath...
MICCAI
2003
Springer
14 years 8 months ago
Analysis Tool for Diffusion Tensor MRI
Abstract. Diffusion Tensor Imaging (DTI) is becoming a routine magnetic resonance technique to study white matter properties and alterations of fiber integrity due to pathology. Th...
Pierre Fillard, Guido Gerig
ATAL
2006
Springer
13 years 11 months ago
Integrating parallel interactions into cooperative search
In this paper we incorporate autonomous agents' capability to perform parallel interactions into the cooperative search model, resulting in a new method which outperforms the...
Efrat Manisterski, David Sarne, Sarit Kraus
CORR
2010
Springer
169views Education» more  CORR 2010»
13 years 1 months ago
Recommender Systems by means of Information Retrieval
In this paper we present a method for reformulating the Recommender Systems problem in an Information Retrieval one. In our tests we have a dataset of users who give ratings for s...
Alberto Costa, Fabio Roda