Sciweavers

1893 search results - page 307 / 379
» Eliciting and Validating Knowledge in Knowledge Management S...
Sort
View
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
14 years 8 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
KDD
2003
ACM
128views Data Mining» more  KDD 2003»
14 years 8 months ago
Similarity analysis on government regulations
Government regulations are semi-structured text documents that are often voluminous, heavily cross-referenced between provisions and even ambiguous. Multiple sources of regulation...
Gloria T. Lau, Kincho H. Law, Gio Wiederhold
HICSS
2007
IEEE
110views Biometrics» more  HICSS 2007»
14 years 2 months ago
The Future of Work: What Does Online Community Have to Do with It?
Amidst constant innovation in information and communication technologies, a new pattern of work is emerging. Hierarchical authority structures are giving way to greater decision-m...
Dejin Zhao, Mary Beth Rosson, Sandeep Purao
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes
CIKM
2005
Springer
14 years 1 months ago
Towards automatic association of relevant unstructured content with structured query results
Faced with growing knowledge management needs, enterprises are increasingly realizing the importance of seamlessly integrating critical business information distributed across bot...
Prasan Roy, Mukesh K. Mohania, Bhuvan Bamba, Shree...