Sciweavers

314 search results - page 57 / 63
» Evaluation of Technologies for Business Process Automation
Sort
View
CIMCA
2008
IEEE
14 years 1 months ago
Mining Bug Repositories--A Quality Assessment
The process of evaluating, classifying, and assigning bugs to programmers is a difficult and time consuming task which greatly depends on the quality of the bug report itself. It ...
Philipp Schügerl, Juergen Rilling, Philippe C...
SEMWEB
2007
Springer
14 years 1 months ago
ASMOV Results for OAEI 2007
Numerous ontology alignment algorithms have appeared in the literature in recent years, but only a few make use of the semantics enclosed within the ontologies in order to improve ...
Yves R. Jean-Mary, Mansur R. Kabuka
WSC
2000
13 years 8 months ago
Anticipatory Planning Support System
A new approach to military operations, called Anticipatory Planning and Adaptive Execution, treats planning and execution as a tightly coupled, single process, and replaces reacti...
John R. Surdu, John M. D. Hill, Udo W. Pooch
GIS
2009
ACM
14 years 8 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
CIKM
2009
Springer
14 years 2 months ago
Joint sentiment/topic model for sentiment analysis
Sentiment analysis or opinion mining aims to use automated tools to detect subjective information such as opinions, attitudes, and feelings expressed in text. This paper proposes ...
Chenghua Lin, Yulan He