Sciweavers

5577 search results - page 1004 / 1116
» E2K Technology and Implementation
Sort
View
CEAS
2005
Springer
15 years 10 months ago
Combating Spam through Legislation: A Comparative Analysis of US and European Approaches
Unsolicited Commercial Communication also known as spam - has traditionally been the most visible e-mail threat and has reached a point where it creates a major problem for the de...
Evangelos Moustakas, C. Ranganathan, Penny Duqueno...
CIKM
2005
Springer
15 years 10 months ago
Query expansion using term relationships in language models for information retrieval
Language Modeling (LM) has been successfully applied to Information Retrieval (IR). However, most of the existing LM approaches only rely on term occurrences in documents, queries...
Jing Bai, Dawei Song, Peter Bruza, Jian-Yun Nie, G...
UML
2005
Springer
15 years 10 months ago
Tool Support for OCL and Related Formalisms - Needs and Trends
The recent trend in software engineering to model-centered methodologies is an excellent opportunity for OCL to become a widely used specification language. If the focus of the de...
Thomas Baar, Dan Chiorean, Alexandre L. Correa, Ma...
DOLAP
2004
ACM
15 years 9 months ago
Physical modeling of data warehouses using UML
During the few last years, several approaches have been proposed to model different aspects of a Data Warehouse (DW), such as the conceptual model of the DW, the design of the ET...
Sergio Luján-Mora, Juan Trujillo
AH
2004
Springer
15 years 9 months ago
PROS: A Personalized Ranking Platform for Web Search
Current search engines rely on centralized page ranking algorithms which compute page rank values as single (global) values for each Web page. Recent work on topic-sensitive PageRa...
Paul-Alexandru Chirita, Daniel Olmedilla, Wolfgang...
« Prev « First page 1004 / 1116 Last » Next »