Sciweavers

187 search results - page 20 / 38
» OWL Change Management Patterns
Sort
View
CIKM
2005
Springer
14 years 3 months ago
WAM-Miner: in the search of web access motifs from historical web log data
Existing web usage mining techniques focus only on discovering knowledge based on the statistical measures obtained from the static characteristics of web usage data. They do not ...
Qiankun Zhao, Sourav S. Bhowmick, Le Gruenwald
AIRS
2004
Springer
14 years 3 months ago
Automatic Word Clustering for Text Categorization Using Global Information
This paper presents a cluster-based text categorization system which uses class distributional clustering of words. We propose a new clustering model which considers the global in...
Wenliang Chen, Xingzhi Chang, Huizhen Wang, Jingbo...
SIGMETRICS
1999
ACM
120views Hardware» more  SIGMETRICS 1999»
14 years 2 months ago
A Performance Study of Dynamic Replication Techniques in Continuous Media Servers
Multimedia applications are emerging in education, information dissemination, entertainment, as well as many other applications. The stringent requirements of such applications ma...
Cheng-Fu Chou, Leana Golubchik, John C. S. Lui
IJNSEC
2006
112views more  IJNSEC 2006»
13 years 9 months ago
An Access Control System with Time-constraint Using Support Vector Machines
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao
SIGSOFT
2006
ACM
14 years 3 months ago
Memories of bug fixes
The change history of a software project contains a rich collection of code changes that record previous development experience. Changes that fix bugs are especially interesting, ...
Sunghun Kim, Kai Pan, E. James Whitehead Jr.