Sciweavers

3196 search results - page 502 / 640
» Knowledge Acquisition for Knowledge Management
Sort
View
157
Voted
EUROPKI
2009
Springer
15 years 1 months ago
ABUSE: PKI for Real-World Email Trust
Current PKI-based email systems (such as X.509 S/MIME and PGP/ MIME) potentially enable a recipient to determine a name and organizational affiliation of the sender. This informati...
Chris Masone, Sean W. Smith
141
Voted
INFSOF
2010
146views more  INFSOF 2010»
15 years 21 days ago
Links between the personalities, views and attitudes of software engineers
Successful software development and management depends not only on the technologies, methods and processes employed but also on the judgments and decisions of the humans involved....
Robert Feldt, Lefteris Angelis, Richard Torkar, Ma...
144
Voted
RE
2010
Springer
14 years 10 months ago
Comparison of Requirements Hand-off, Analysis, and Negotiation: Case Study
Companies in the software business often distribute requirements engineering responsibilities over several roles. Product management has overall product responsibility and performs...
Samuel Fricker, Martin Glinz
TNN
2010
205views Management» more  TNN 2010»
14 years 10 months ago
Behavior-constrained support vector machines for fMRI data analysis
Statistical learning methods are emerging as a valuable tool for decoding information from neural imaging data. The noisy signal and the limited number of training patterns that ar...
Danmei Chen, Sheng Li, Zoe Kourtzi, Si Wu
152
Voted
ESWS
2011
Springer
14 years 7 months ago
Optimizing Query Shortcuts in RDF Databases
The emergence of the Semantic Web has led to the creation of large semantic knowledge bases, often in the form of RDF databases. Improving the performance of RDF databases necessit...
Vicky Dritsou, Panos Constantopoulos, Antonios Del...