Sciweavers

274 search results - page 44 / 55
» Literature-Based Discovery by an Enhanced Information Retrie...
Sort
View
STORAGESS
2005
ACM
14 years 1 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo
HT
2005
ACM
14 years 1 months ago
Queries as anchors: selection by association
This paper introduces a new method for linking the world view of the search engine user community with that of the search engine itself. This new method is based on collecting and...
Einat Amitay, Adam Darlow, David Konopnicki, Uri W...
CN
1999
143views more  CN 1999»
13 years 7 months ago
Embedding Knowledge in Web Documents
The paper argues for the use of general and intuitive knowledge representation languages (and simpler notational variants, e.g. subsets of natural languages) for indexing the cont...
Philippe Martin, Peter W. Eklund
ESWS
2007
Springer
14 years 1 months ago
Towards an Ontology for Process Monitoring and Mining
Abstract. Business Process Analysis (BPA) aims at monitoring, diagnosing, simulating and mining enacted processes in order to support the analysis and enhancement of process models...
Carlos Pedrinaci, John Domingue
WEBI
2007
Springer
14 years 1 months ago
Growing Hierarchical Self-Organizing Maps for Web Mining
— Many information retrieval and machine learning methods have not evolved in order to be applied to the Web. Two main problems in applying some machine learning techniques for W...
Joseph P. Herbert, Jingtao Yao