Sciweavers

15474 search results - page 3009 / 3095
» Emergent process design
Sort
View
CIKM
2009
Springer
14 years 28 days ago
Efficient feature weighting methods for ranking
Feature weighting or selection is a crucial process to identify an important subset of features from a data set. Removing irrelevant or redundant features can improve the generali...
Hwanjo Yu, Jinoh Oh, Wook-Shin Han
DEBS
2007
ACM
14 years 28 days ago
High frequency distributed data stream event correlation to improve neonatal clinical management
Approximately eighteen percent (18%) of babies born in New South Wales (NSW), Australia require special care or neonatal intensive care admission. Premature babies can be up to 17...
Carolyn McGregor, Michael Stacey
SIGIR
2010
ACM
14 years 27 days ago
Personalizing information retrieval for multi-session tasks: the roles of task stage and task type
Dwell time as a user behavior has been found in previous studies to be an unreliable predictor of document usefulness, with contextual factors such as the user’s task needing to...
Jingjing Liu, Nicholas J. Belkin
SOUPS
2010
ACM
14 years 27 days ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
14 years 27 days ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
« Prev « First page 3009 / 3095 Last » Next »