Sciweavers

4752 search results - page 27 / 951
» From computation models to models of provenance: the RWS app...
Sort
View
SACMAT
2011
ACM
12 years 10 months ago
Modeling data flow in socio-information networks: a risk estimation approach
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling...
NLE
2010
112views more  NLE 2010»
13 years 6 months ago
A non-negative tensor factorization model for selectional preference induction
Distributional similarity methods have proven to be a valuable tool for the induction of semantic similarity. Up till now, most algorithms use two-way cooccurrence data to compute...
Tim Van de Cruys
GI
2003
Springer
14 years 22 days ago
Business Process Reference Model Languages: Experiences from BPI Projects
: Natural Language is not appropriate for reference models because it risks being an in-complete, unstructured and inconsistent form of representation. This paper presents insights...
Chris I. Taylor, Christian Probst
JUCS
2010
150views more  JUCS 2010»
13 years 6 months ago
Situation-Aware Community Computing Model for Developing Dynamic Ubiquitous Computing Systems
: For many complex and dynamic ubiquitous services, context-aware cooperation can be a solution. However, the way is not yet clear to make individual objects cooperate with each ot...
Youna Jung, Minsoo Kim
PE
2010
Springer
124views Optimization» more  PE 2010»
13 years 2 months ago
High-level approach to modeling of observed system behavior
Current computer systems and communication networks tend to be highly complex, and they typically hide their internal structure from their users. Thus, for selected aspects of cap...
Thomas Begin, Alexandre Brandwajn, Bruno Baynat, B...