Sciweavers

1893 search results - page 285 / 379
» Eliciting and Validating Knowledge in Knowledge Management S...
Sort
View
ICDM
2008
IEEE
143views Data Mining» more  ICDM 2008»
14 years 2 months ago
Exploiting Data Semantics to Discover, Extract, and Model Web Sources
We describe DEIMOS, a system that automatically discovers and models new sources of information. The system exploits four core technologies developed by our group that makes an en...
José Luis Ambite, Craig A. Knoblock, Kristi...
RTAS
2005
IEEE
14 years 1 months ago
Optimal Time-Variant Resource Allocation for Internet Servers with Delay
The increasing popularity of high-volume performancecritical Internet applications calls for a scalable server design that allows meeting individual response-time guarantees. Cons...
Xiliang Zhong, Cheng-Zhong Xu, Minghua Xu, Jianbin...
CTW
2006
88views more  CTW 2006»
13 years 8 months ago
Using multiple cognitive task analysis methods for supervisory control interface design in high-throughput biological screening
Cognitive task analysis (CTA) approaches are currently needed in many domains to provide explicit guidance on redesigning existing systems. This study used goal-directed task analy...
David B. Kaber, Noa Segall, Rebecca S. Green, K. E...
SICHERHEIT
2010
13 years 6 months ago
Quantifying the Attack Surface of a Web Application
Abstract: The attack surface of a system represents the exposure of application objects to attackers and is affected primarily by architecture and design decisions. Given otherwise...
Thomas Heumann, Sven Türpe, Jörg Keller
AGENTLINK
2003
Springer
283views ECommerce» more  AGENTLINK 2003»
14 years 1 months ago
MIKS : An Agent Framework Supporting Information Access and Integration
Providing an integrated access to multiple heterogeneous sources is a challenging issue in global information systems for cooperation and interoperability. In the past, companies h...
Domenico Beneventano, Sonia Bergamaschi, Gionata G...