Sciweavers

2028 search results - page 89 / 406
» Deriving Relation Keys from XML Keys
Sort
View
LREC
2010
219views Education» more  LREC 2010»
15 years 5 months ago
Approaches to Text Mining Arguments from Legal Cases
Abstract. This paper describes recent approaches using text-mining to automatically profile and extract arguments from legal cases. We outline some of the background context and mo...
Adam Wyner, Raquel Mochales Palau, Marie-Francine ...
AUIC
2006
IEEE
15 years 10 months ago
From pushing buttons to play and progress: value and interaction in fable
A value can be understood as a belief that one mode of conduct is preferable to others. The user-interface of computer games mediates all player conduct in the game and is therefo...
Pippin Barr, James Noble, Robert Biddle, Rilla Kha...
IWPC
2005
IEEE
15 years 9 months ago
Understanding Object-Oriented Source Code from the Behavioural Perspective
Comprehension is a key activity that underpins a variety of software maintenance and engineering tasks. The task of understanding object-oriented systems is hampered by the fact t...
Neil Walkinshaw, Marc Roper, Murray Wood
BIBE
2009
IEEE
131views Bioinformatics» more  BIBE 2009»
15 years 7 months ago
Learning Scaling Coefficient in Possibilistic Latent Variable Algorithm from Complex Diagnosis Data
—The Possibilistic Latent Variable (PLV) clustering algorithm is a powerful tool for the analysis of complex datasets due to its robustness toward data distributions of different...
Zong-Xian Yin
ISSA
2008
15 years 5 months ago
Password Management: Empirical Results from a RSA and USA Study
"The state of information security as a whole is a disaster, a train wreck". This view is given by Forte and Power (2007) describing the state of information security to...
Hennie A. Kruger, Tjaart Steyn, Lynette Drevin, Da...