Sciweavers

2080 search results - page 300 / 416
» Collections, Cardinalities, and Relations
Sort
View
BPM
2008
Springer
143views Business» more  BPM 2008»
13 years 11 months ago
Mining Based on Learning from Process Change Logs
In today's dynamic business world economic success of an enterprise increasingly depends on its ability to react to internal and external changes in a quick and flexible way. ...
Chen Li, Manfred Reichert, Andreas Wombacher
CCS
2008
ACM
13 years 11 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
CEAS
2008
Springer
13 years 11 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
CIKM
2008
Springer
13 years 11 months ago
Ranked feature fusion models for ad hoc retrieval
We introduce the Ranked Feature Fusion framework for information retrieval system design. Typical information retrieval formalisms such as the vector space model, the bestmatch mo...
Jeremy Pickens, Gene Golovchinsky
CIKM
2008
Springer
13 years 11 months ago
An effective statistical approach to blog post opinion retrieval
Finding opinionated blog posts is still an open problem in information retrieval, as exemplified by the recent TREC blog tracks. Most of the current solutions involve the use of e...
Ben He, Craig Macdonald, Jiyin He, Iadh Ounis