Sciweavers

5203 search results - page 1036 / 1041
» An approach to workflow modeling and analysis
Sort
View
JUCS
2008
112views more  JUCS 2008»
13 years 8 months ago
Knowledge Processing in Intelligent Systems
Abstract: Intelligence and Knowledge play more and more important roles in building complex intelligent systems, for instance, intrusion detection systems, and operational analysis...
Longbing Cao, Ngoc Thanh Nguyen
DSS
2007
96views more  DSS 2007»
13 years 8 months ago
Factors relating to the decision to click on a sponsored link
In this paper, we report results of an investigation into the factors influencing the selection of sponsored links by e-commerce Web searchers. In this research, 56 participants e...
Bernard J. Jansen, Anna Brown, Marc Resnick
GEOINFORMATICA
2007
111views more  GEOINFORMATICA 2007»
13 years 8 months ago
LiDAR-Derived High Quality Ground Control Information and DEM for Image Orthorectification
Orthophotos (or orthoimages if in digital form) have long been recognised as a supplement or alternative to standard maps. The increasing applications of orthoimages require effor...
Xiaoye Liu, Zhenyu Zhang, Jim Peterson, Shobhit Ch...
IEEESP
2007
98views more  IEEESP 2007»
13 years 8 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
IJMMS
2007
166views more  IJMMS 2007»
13 years 8 months ago
Visualization of large networks with min-cut plots, A-plots and R-MAT
What does a ‘normal’ computer (or social) network look like? How can we spot ‘abnormal’ sub-networks in the Internet, or web graph? The answer to such questions is vital f...
Deepayan Chakrabarti, Christos Faloutsos, Yiping Z...
« Prev « First page 1036 / 1041 Last » Next »