Sciweavers

495 search results - page 83 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
IAT
2006
IEEE
14 years 3 months ago
Crime Pattern Detection Using Data Mining
Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes f...
Shyam Varan Nath
INFOVIS
1999
IEEE
14 years 1 months ago
Sensemaking of Evolving Web Sites Using Visualization Spreadsheets
In the process of knowledge discovery, workers examine available information in order to make sense of it. By sensemaking, we mean interacting with and operating on the informatio...
Ed Huai-hsin Chi, Stuart K. Card
EGOV
2008
Springer
13 years 11 months ago
Paving the Way to eGovernment Transformation: Interoperability Registry Infrastructure Development
During the last decades eGovernment has been a vivid, dynamic research and development area. As services are being transformed, electronic documents and web services appear every d...
Aikaterini-Maria Sourouni, Fenareti Lampathaki, Sp...
AEI
2007
112views more  AEI 2007»
13 years 9 months ago
A p2p based service flow system with advanced ontology-based service profiles
A peer-to-peer (p2p) based service flow management system, SwinDeW-S, could support decentralised Web service composition, deployment and enactment. However, traditional workflow ...
Jun Shen, Yun Yang, Jun Yan
JCDL
2011
ACM
191views Education» more  JCDL 2011»
13 years 15 days ago
Serendipitous recommendation for scholarly papers considering relations among researchers
Serendipity occurs when one finds an interesting discovery while searching for something else. In digital libraries, recommendation engines are particularly well-suited for seren...
Kazunari Sugiyama, Min-Yen Kan