Sciweavers

2399 search results - page 427 / 480
» Avatar Information Extraction System
Sort
View
CCS
2008
ACM
15 years 6 months ago
Reconsidering physical key secrecy: teleduplication via optical decoding
The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private -- that duplication should require eithe...
Benjamin Laxton, Kai Wang, Stefan Savage
BIOSTEC
2008
192views Healthcare» more  BIOSTEC 2008»
15 years 5 months ago
Application of Process Mining in Healthcare - A Case Study in a Dutch Hospital
Abstract. To gain competitive advantage, hospitals try to streamline their processes. In order to do so, it is essential to have an accurate view of the "careflows" under...
R. S. Mans, Helen Schonenberg, Minseok Song, Wil M...
LREC
2010
157views Education» more  LREC 2010»
15 years 5 months ago
Indexing Methods for Faster and More Effective Person Name Search
This paper compares several indexing methods for person names extracted from text, developed for an information retrieval system with requirements for fast approximate matching of...
Mark Arehart
131
Voted
LREC
2010
187views Education» more  LREC 2010»
15 years 5 months ago
Ontology-Based Categorization of Web Services with Machine Learning
We present the problem of categorizing web services according to a shallow ontology for presentation on a specialist portal, using their WSDL and associated textual documents foun...
Adam Funk, Kalina Bontcheva
ICWS
2008
IEEE
15 years 5 months ago
A Temporal Data-Mining Approach for Discovering End-to-End Transaction Flows
Effective management of Web Services systems relies on accurate understanding of end-to-end transaction flows, which may change over time as the service composition evolves. This ...
Ting Wang, Chang-Shing Perng, Tao Tao, Chunqiang T...