Sciweavers

93 search results - page 12 / 19
» Automatic Extraction of a WordNet-Like Identifier Network fr...
Sort
View
IDT
2010
138views more  IDT 2010»
13 years 6 months ago
Challenging computer software frontiers and the human resistance to change
This paper examines the driving and opposing forces that are governing the current paradigm shift from a data-processing information technology environment without software intell...
Jens Pohl
ACL
2010
13 years 5 months ago
Hunting for the Black Swan: Risk Mining from Text
In the business world, analyzing and dealing with risk permeates all decisions and actions. However, to date, risk identification, the first step in the risk management cycle, has...
Jochen L. Leidner, Frank Schilder
MINENET
2005
ACM
14 years 1 months ago
ACAS: automated construction of application signatures
An accurate mapping of traffic to applications is important for a broad range of network management and measurement tasks. Internet applications have traditionally been identifi...
Patrick Haffner, Subhabrata Sen, Oliver Spatscheck...
IUI
2009
ACM
14 years 4 months ago
Have a say over what you see: evaluating interactive compression techniques
We all encounter many documents on a daily basis that we do not have time to process in their entirety. Nevertheless, we lack good tools to rapidly skim and identify key informati...
Simon Tucker, Steve Whittaker
CHI
2005
ACM
14 years 7 months ago
Visualization in law enforcement
Visualization techniques have proven to be critical in helping crime analysis. By interviewing and observing Criminal Intelligence Officers (CIO) and civilian crime analysts at th...
Hsinchun Chen, Homa Atabakhsh, Chunju Tseng, Byron...