Sciweavers

3737 search results - page 550 / 748
» Knowledge Management and Promises
Sort
View
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
14 years 8 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
KDD
2003
ACM
128views Data Mining» more  KDD 2003»
14 years 8 months ago
Similarity analysis on government regulations
Government regulations are semi-structured text documents that are often voluminous, heavily cross-referenced between provisions and even ambiguous. Multiple sources of regulation...
Gloria T. Lau, Kincho H. Law, Gio Wiederhold
EUROSYS
2008
ACM
14 years 5 months ago
Task activity vectors: a new metric for temperature-aware scheduling
Non-uniform utilization of functional units in combination with hardware mechanisms such as clock gating leads to different power consumptions in different parts of a processor ch...
Andreas Merkel, Frank Bellosa
CHI
2010
ACM
14 years 3 months ago
Fitting an activity-centric system into an ecology of workplace tools
Knowledge workers expend considerable effort managing fragmentation, characterized by constant switching among digital artifacts, when executing work activities. Activitycentric c...
Aruna D. Balakrishnan, Tara Matthews, Thomas P. Mo...
RULEML
2009
Springer
14 years 2 months ago
Exploration of SWRL Rule Bases through Visualization, Paraphrasing, and Categorization of Rules
Rule bases are increasingly being used as repositories of knowledge content on the Semantic Web. As the size and complexity of these rule bases s, developers and end users need met...
Saeed Hassanpour, Martin J. O'Connor, Amar K. Das