Sciweavers

17018 search results - page 63 / 3404
» From the How to the What
Sort
View
HICSS
2010
IEEE
240views Biometrics» more  HICSS 2010»
14 years 2 months ago
Can e-Government Adopters Benefit from a Technology-First Approach? The Case of Egypt Embarking on Service-Oriented Architecture
It seems common sense that “policy matters” in setting up e-government interoperability, mainly because collaboration should be guided by dedicated integration objectives and ...
Ralf Klischewski, Ranwa Abubakr
CLEF
2007
Springer
14 years 2 months ago
Unsupervised Acquiring of Morphological Paradigms from Tokenized Text
This paper describes a rather simplistic method of unsupervised morphological analysis of words in an unknown language. All what is needed is a raw text corpus in the given langua...
Daniel Zeman
HICSS
2005
IEEE
175views Biometrics» more  HICSS 2005»
14 years 1 months ago
Creating Value from Digital Content: eBusiness Model Evolution in Online News and Music
The past two years have been a turbulent time for the New Economy generally – and for the digital content industry in particular. In the wake of the dot.com and telecoms crashes...
Kornelia van der Beek, Paula M. C. Swatman, Cornel...
COLT
2005
Springer
14 years 1 months ago
A PAC-Style Model for Learning from Labeled and Unlabeled Data
Abstract. There has been growing interest in practice in using unlabeled data together with labeled data in machine learning, and a number of different approaches have been develo...
Maria-Florina Balcan, Avrim Blum
NSDI
2007
13 years 10 months ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...