Sciweavers

1103 search results - page 155 / 221
» Evaluating CBR Systems Using Different Data Sources: A Case ...
Sort
View
ISEMANTICS
2010
13 years 9 months ago
Foundations of data interoperability on the web: a web science perspective
In this paper, when we use the term ontology, we are primarily referring to linked data in the form of RDF(S). The problem of ontology mapping has attracted considerable attention...
Hamid Haidarian Shahri
IPPS
2007
IEEE
14 years 2 months ago
Security Threat Prediction in a Local Area Network Using Statistical Model
In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
Somak Bhattacharya, S. K. Ghosh
ICDE
2009
IEEE
138views Database» more  ICDE 2009»
13 years 5 months ago
Similarity Group-By
The identification and processing of similarities in the data play a key role in multiple application scenarios. Several types of similarity-aware operations have been studied in ...
Yasin N. Silva, Walid G. Aref, Mohamed H. Ali
BMCBI
2005
155views more  BMCBI 2005»
13 years 7 months ago
Mining protein function from text using term-based support vector machines
Background: Text mining has spurred huge interest in the domain of biology. The goal of the BioCreAtIvE exercise was to evaluate the performance of current text mining systems. We...
Simon B. Rice, Goran Nenadic, Benjamin J. Stapley
ICAC
2006
IEEE
14 years 2 months ago
QMON: QoS- and Utility-Aware Monitoring in Enterprise Systems
Abstract— The scale, reliability, and cost requirements of enterprise data centers require automation of center management. Examples include provisioning, scheduling, capacity pl...
Sandip Agarwala, Yuan Chen, Dejan S. Milojicic, Ka...