Sciweavers

880 search results - page 65 / 176
» Looking at data
Sort
View
SEMWEB
2009
Springer
14 years 4 months ago
Investigating the Semantic Gap through Query Log Analysis
Significant efforts have focused in the past years on bringing large amounts of metadata online and the success of these efforts can be seen by the impressive number of web site...
Peter Mika, Edgar Meij, Hugo Zaragoza
ADBIS
2005
Springer
170views Database» more  ADBIS 2005»
14 years 3 months ago
Architecture of Pattern Management Software System
Patterns and models are artifacts that are assets to their owners. Storing them in a repository and using common interfaces for their management simplifies their usage. This articl...
Erki Eessaar
GIS
2009
ACM
14 years 2 months ago
Machine learning approach to report prioritization with an application to travel time dissemination
This paper looks at the problem of data prioritization, commonly found in mobile ad-hoc networks. The proposed general solution uses a machine learning approach in order to learn ...
Piotr Szczurek, Bo Xu, Jie Lin, Ouri Wolfson
ICSE
2009
IEEE-ACM
14 years 5 months ago
Automated substring hole analysis
Code coverage is a common measure for quantitatively assessing the quality of software testing. Code coverage indicates the fraction of code that is actually executed by tests in ...
Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pel...
ICARIS
2005
Springer
14 years 3 months ago
Polymorphism and Danger Susceptibility of System Call DASTONs
We have proposed a metaphor “DAnger Susceptible daTa codON” (DASTON) in data subject to processing by Danger Theory (DT) based Artificial Immune System (DAIS). The DASTONs are ...
Anjum Iqbal, Mohd Aizaini Maarof