Sciweavers

325 search results - page 48 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
CLEF
2007
Springer
14 years 1 months ago
CLEF 2007: Ad Hoc Track Overview
We describe the objectives and organization of the CLEF 2007 ad hoc track and discuss the main characteristics of the tasks offered to test monolingual and cross-language textual d...
Giorgio Maria Di Nunzio, Nicola Ferro, Thomas Mand...
KDD
2012
ACM
183views Data Mining» more  KDD 2012»
11 years 10 months ago
Mining discriminative components with low-rank and sparsity constraints for face recognition
This paper introduces a novel image decomposition approach for an ensemble of correlated images, using low-rank and sparsity constraints. Each image is decomposed as a combination...
Qiang Zhang, Baoxin Li
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 7 months ago
Detecting Coordination Problems in Collaborative Software Development Environments
Software development is rarely an individual effort and generally involves teams of developers collaborating to generate good reliable code. Among the software code there exist te...
Chintan Amrit, Jos van Hillegersberg
CIKM
2007
Springer
14 years 1 months ago
Generalizing from relevance feedback using named entity wildcards
Traditional adaptive filtering systems learn the user’s interests in a rather simple way – words from relevant documents are favored in the query model, while words from irre...
Abhimanyu Lad, Yiming Yang
BIS
2009
154views Business» more  BIS 2009»
13 years 8 months ago
Using Process Mining to Generate Accurate and Interactive Business Process Maps
Abstract. The quality of today's digital maps is very high. This allows for new functionality as illustrated by modern car navigation systems (e.g., TomTom, Garmin, etc.), Goo...
Wil M. P. van der Aalst