Sciweavers

678 search results - page 109 / 136
» Knowledge Acquisition
Sort
View
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
14 years 3 months ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...
KDD
2009
ACM
184views Data Mining» more  KDD 2009»
14 years 3 months ago
Thumbs-Up: a game for playing to rank search results
Human computation is an effective way to channel human effort spent playing games to solving computational problems that are easy for humans but difficult for computers to autom...
Ali Dasdan, Chris Drome, Santanu Kolay, Micah Alpe...
IWPC
2009
IEEE
14 years 3 months ago
Reading the documentation of invoked API functions in program comprehension
Comprehending an unfamiliar code fragment requires an awareness of explicit usage directives that may be present in the documentation of some invoked functions. Since it is not pr...
Uri Dekel, James D. Herbsleb
KCAP
2009
ACM
14 years 3 months ago
POIROT: acquiring workflows by combining models learned from interpreted traces
The POIROT project is a four-year effort to develop an architecture that integrates the products of a number of targeted reasoning and learning components to produce executable re...
Mark H. Burstein, Fusun Yaman, Robert Laddaga, Rob...
SIGIR
2009
ACM
14 years 3 months ago
Web-derived resources for web information retrieval: from conceptual hierarchies to attribute hierarchies
A weakly-supervised extraction method identifies concepts within conceptual hierarchies, at the appropriate level of specificity (e.g., Bank vs. Institution), to which attribute...
Marius Pasca, Enrique Alfonseca