Sciweavers

6826 search results - page 1332 / 1366
» Business Process Intelligence
Sort
View
JCDL
2009
ACM
139views Education» more  JCDL 2009»
14 years 4 months ago
Topic model methods for automatically identifying out-of-scope resources
Recent years have seen the rise of subject-themed digital libraries, such as the NSDL pathways and the Digital Library for Earth System Education (DLESE). These libraries often ne...
Steven Bethard, Soumya Ghosh, James H. Martin, Tam...
KCAP
2009
ACM
14 years 4 months ago
Biomedical knowledge engineering tools based on experimental design: a case study based on neuroanatomical tract-tracing experim
Curating information from the literature for storage in databases is a crucial task in biological research, and many groups assign a particular person or team to that process. We ...
Gully A. P. C. Burns, Thomas A. Russ
RECSYS
2009
ACM
14 years 4 months ago
Latent dirichlet allocation for tag recommendation
Tagging systems have become major infrastructures on the Web. They allow users to create tags that annotate and categorize content and share them with other users, very helpful in...
Ralf Krestel, Peter Fankhauser, Wolfgang Nejdl
ACSC
2008
IEEE
14 years 4 months ago
On illegal composition of first-class agent interaction protocols
In this paper, we examine the composition of firstclass protocols for multi-agent systems. First-class protocols are protocols that exist as executable specifications that agent...
Tim Miller, Peter McBurney
DATE
2008
IEEE
223views Hardware» more  DATE 2008»
14 years 4 months ago
Cooperative Safety: a Combination of Multiple Technologies
—Governmental Transportation Authorities' interest in Car to Car and Car to Infrastructure has grown dramatically over the last few years in order to increase the road safet...
Raffaele Penazzi, Piergiorgio Capozio, Martin Dunc...
« Prev « First page 1332 / 1366 Last » Next »