Sciweavers

1244 search results - page 201 / 249
» Cluster Based Personalized Search
Sort
View
IADIS
2003
14 years 3 days ago
DENOFAS: A Vulnerability Assessment Tool
This paper describes the development of a software tool for detection of vulnerabilities in networked systems, using public available security resources. Our tool builds is knowle...
Rui Costa Cardoso, Mário M. Freire
JSW
2008
167views more  JSW 2008»
13 years 10 months ago
An Approach to Discover Dependencies between Service Operations
Service composition is emerging as an important paradigm for constructing distributed applications by combining and reusing independently developed component services. One key issu...
Shuying Yan, Jing Wang 0002, Chen Liu, Lei Liu
CSCW
2004
ACM
13 years 10 months ago
Building Connections among Loosely Coupled Groups: Hebb's Rule at Work
Awareness of others' interests can lead to fruitful collaborations, friendships and positive social change. Interviews of groups involved in both research and corporate work r...
Scott Carter, Jennifer Mankoff, P. Goddi
NGC
2002
Springer
107views Communications» more  NGC 2002»
13 years 10 months ago
An Information Management System with the Facility to Support Long-term Creative Thinking
Abstract Most previous creativity support systems sustain shortterm temporal thinking that is separate from users' daily activities. In this paper, we propose a system to supp...
Hirohito Shibata, Koichi Hori
BMVC
2010
13 years 8 months ago
Accounting for the Relative Importance of Objects in Image Retrieval
We introduce a method for image retrieval that leverages the implicit information about object importance conveyed by the list of keyword tags a person supplies for an image. We p...
Sung Ju Hwang, Kristen Grauman