Sciweavers

2520 search results - page 415 / 504
» Knowledge Management Challenges in Knowledge Discovery Syste...
Sort
View
FMCO
2008
Springer
110views Formal Methods» more  FMCO 2008»
15 years 5 months ago
Reusable Architectural Decision Model for Model and Metadata Repositories
Models are gaining importance in software development, for instance in the MDD field, as well as in other disciplines such as biology and physics. Hence, tool support is needed to ...
Christine Mayr, Uwe Zdun, Schahram Dustdar
WWW
2007
ACM
16 years 5 months ago
Construction by linking: the linkbase method
The success of many innovative Web applications is not based on the content they produce ? but on how they combine and link existing content. Older Web Engineering methods lack fl...
Johannes Meinecke, Frederic Majer, Martin Gaedke
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
16 years 4 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
KDD
2003
ACM
128views Data Mining» more  KDD 2003»
16 years 4 months ago
Similarity analysis on government regulations
Government regulations are semi-structured text documents that are often voluminous, heavily cross-referenced between provisions and even ambiguous. Multiple sources of regulation...
Gloria T. Lau, Kincho H. Law, Gio Wiederhold
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
15 years 10 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes