Sciweavers

27 search results - page 5 / 6
» CHECK: a document plagiarism detection system
Sort
View
QSIC
2007
IEEE
14 years 1 months ago
Model Checking Security Pattern Compositions
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...
Jing Dong, Tu Peng, Yajing Zhao
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
13 years 9 months ago
Meta Analysis within Authorship Verification
In an authorship verification problem one is given writing examples from an author A, and one is asked to determine whether or not each text in fact was written by A. In a more ge...
Benno Stein, Nedim Lipka, Sven Meyer zu Eissen
BIS
2007
92views Business» more  BIS 2007»
13 years 9 months ago
Supporting Use-Case Reviews
Abstract. Use cases are a popular way of specifying functional requirements of computer-based systems. Each use case contains a sequence of steps which are described with a natural...
Alicja Ciemniewska, Jakub Jurkiewicz, Lukasz Olek,...
ICDM2
2004
Springer
196views Data Mining» more  ICDM2 2004»
14 years 29 days ago
An Early Warning System for Vehicle Related Quality Data
Vehicle production audit tests, warranty claims and car control unit data are stored in a central data warehouse for data mining analysis. Neural network based part failure rate es...
Matthias Grabert, Markus Prechtel, Tomas Hrycej, W...
CLEF
2009
Springer
13 years 8 months ago
Information Retrieval Baselines for the ResPubliQA Task
This paper describes the baselines proposed for the ResPubliQA 2009 task. These baselines are purely based on information retrieval techniques. The selection of an adequate retrie...
Joaquín Pérez-Iglesias, Guillermo Ga...