Sciweavers

264 search results - page 26 / 53
» Making Argumentation More Believable
Sort
View
WWW
2007
ACM
14 years 8 months ago
Towards domain-independent information extraction from web tables
Traditionally, information extraction from web tables has focused on small, more or less homogeneous corpora, often based on assumptions about the use of <table> tags. A mul...
Bernhard Krüpl, Bernhard Pollak, Marcus Herzo...
HICSS
2009
IEEE
195views Biometrics» more  HICSS 2009»
14 years 2 months ago
Cyber Migration: An Empirical Investigation on Factors that Affect Users' Switch Intentions in Social Networking Sites
In recent years, Social Networking Sites (SNSs) have increasingly gained popularity. With the existence of hundreds of such sites, it is not uncommon to have users switching betwe...
Zengyan Cheng, Yinping Yang, John Lim
BDIM
2007
IEEE
95views Business» more  BDIM 2007»
14 years 1 months ago
A Mechanism of Specifying and Determining Pricing in Utility Computing Environments
Utility services providers offer on-demand services for multiple users and applications from a shared resource pool. The utility computing environment provider manages resources th...
Jinsong Ouyang, Akhil Sahai, Jim Pruyne
ICC
2007
IEEE
111views Communications» more  ICC 2007»
14 years 1 months ago
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
— In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems/networks. This has become a key issue for IT infrastru...
Reiko Ann Miura-Ko, Nicholas Bambos
PERVASIVE
2007
Springer
14 years 1 months ago
Interstitial Interfaces for Mobile Media
Mobile devices make ideal personal ambient information systems given their ubiquitous adoption by users and their rich context knowledge of users’ activity. However, we believe ...
Jehan Wickramasuriya, Venu Vasudevan, Nitya Narasi...