Sciweavers

3737 search results - page 643 / 748
» Knowledge Management and Promises
Sort
View
WAIM
2004
Springer
14 years 1 months ago
Mining Inheritance Rules from Genealogical Data
Data mining extracts implicit, previously unknown and potentially useful information from databases. Many approaches have been proposed to extract information, and one of the most ...
Yen-Liang Chen, Jing-Tin Lu
COOPIS
2003
IEEE
14 years 1 months ago
Advertising Games for Web Services
In: Proceedings of the Eleventh International Conference on Cooperative Information Systems (CoopIS-03), pp. 93–109, Springer-Verlag LNCS Series. c 2003 by Springer-Verlag. We a...
Alessandro Agostini, Paolo Avesani
COOPIS
2003
IEEE
14 years 1 months ago
Automatic Expansion of Manual Email Classifications Based on Text Analysis
The organization of documents is a task that we face as computer users daily. This is particularly true for management of email. Typically email documents are organized in director...
Enrico Giacoletto, Karl Aberer
CSB
2003
IEEE
135views Bioinformatics» more  CSB 2003»
14 years 1 months ago
Stepping Up the Pace of Discovery: the Genomes to Life Program
Genomes to Life (GTL), the U.S. Department of Energy Office of Science’s systems biology program, focuses on environmental microbiology. Over the next 10 to 20 years, GTL’s ke...
Marvin Frazier, David Thomassen, Aristides Patrino...
DISCEX
2003
IEEE
14 years 1 months ago
Detecting Spoofed Packets
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of t...
Steven J. Templeton, Karl E. Levitt