Sciweavers

4486 search results - page 138 / 898
» Cross-Evaluation: A new model for information system evaluat...
Sort
View
RAID
2010
Springer
13 years 7 months ago
Bait Your Hook: A Novel Detection Technique for Keyloggers
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...
SIGIR
1998
ACM
14 years 1 months ago
Modeling and Combining Evidence Provided by Document Relationships Using Probabilistic Argumentation Systems
Previous research has shown that hypertext links may be a useful source of evidence for document contents and relevance, but these evidence are rather difficult to represent and co...
Justin Picard
ICEGOV
2009
ACM
13 years 6 months ago
Design of a web-based tendering system for e-government procurement
Procurement for e-Government is an important part of activities which are similar to the nature of B2B. That is usually characterized by bulk volumes with complex variables, burea...
Simon Fong, Zhuang Yan
SIGMOD
2010
ACM
231views Database» more  SIGMOD 2010»
14 years 1 months ago
Automatically incorporating new sources in keyword search-based data integration
Scientific data offers some of the most interesting challenges in data integration today. Scientific fields evolve rapidly and accumulate masses of observational and experiment...
Partha Pratim Talukdar, Zachary G. Ives, Fernando ...
EUROMICRO
2003
IEEE
14 years 2 months ago
Web Service Composition Languages: Old Wine in New Bottles?
Recently, several languages for web service composition have emerged (e.g., BPEL4WS and WSCI). The goal of these languages is to glue web services together in a process-oriented w...
Wil M. P. van der Aalst, Marlon Dumas, Arthur H. M...