Sciweavers

1579 search results - page 111 / 316
» How Good is the Crowd at
Sort
View
HICSS
1999
IEEE
82views Biometrics» more  HICSS 1999»
14 years 17 days ago
On the Spanning Hypothesis for EDI Semantics
What EDI needs is a good semantics, that is, a workable formal theory of what EDI messages mean. As is widely recognized, the point applies to electronic commerce and to communica...
Steven O. Kimbrough, Scott A. Moore
DL
1999
Springer
187views Digital Library» more  DL 1999»
14 years 16 days ago
KEA: Practical Automatic Keyphrase Extraction
Keyphrases provide semantic metadata that summarize and characterize documents. This paper describes Kea, an algorithm for automatically extracting keyphrases from text. Kea ident...
Ian H. Witten, Gordon W. Paynter, Eibe Frank, Carl...
WETICE
1998
IEEE
14 years 15 days ago
The Problem with Multiple Roots in Web Browsers - Certificate Masquerading
Much work is going into securing the public key infrastructure (PKI). Various models for trust exist; Pretty Good Privacy (PGP) and the Progressive-Constraint Trust model are exam...
James M. Hayes
ACMSE
1998
ACM
14 years 15 days ago
Improving software quality
– It is difficult to improve software quality by relying on conformance to industry standards by continuously upgrading from one standard or model to another standard or model be...
Sharon Wheeler, Sheryl Duggins
AGENTS
1998
Springer
14 years 15 days ago
A Market Architecture for Multi-Agent Contracting
We present a generalized market architecture that provides support for a variety of types of transactions, from simple buying and selling of goods and services to complex multi-age...
John Collins, Ben Youngdahl, Scott Jamison, Bamsha...