Sciweavers

418 search results - page 75 / 84
» Overview of TREC 2004
Sort
View
ISSA
2004
13 years 9 months ago
A Comparative Study Of Standards And Practices Related To Information Security Management
The need for Information Security in organisations, regardless of their type and size, is being addressed by emerging standards and recommended best practices. The various standar...
Evangelos D. Frangopoulos
NIPS
2004
13 years 9 months ago
Active Learning for Anomaly and Rare-Category Detection
We introduce a novel active-learning scenario in which a user wants to work with a learning algorithm to identify useful anomalies. These are distinguished from the traditional st...
Dan Pelleg, Andrew W. Moore
SPLC
2004
13 years 9 months ago
Observations from the Recovery of a Software Product Family
The problem of managing the evolution of complex and large software systems is well known. Evolution implies reuse and modification of existing software artifacts, and this means t...
Patricia Lago, Hans van Vliet
AIEDAM
2004
77views more  AIEDAM 2004»
13 years 7 months ago
The role of trust in distributed design
Automated support of design teams, consisting of both human and automated systems, requires an understanding of the role of trust in distributed design processes. By explicitating ...
Niek J. E. Wijngaards, Hidde M. Boonstra, Frances ...
WS
2008
ACM
13 years 7 months ago
OWL 2: The next step for OWL
Since achieving W3C recommendation status in 2004, the Web Ontology Language (OWL) has been successfully applied to many problems in computer science. Practical experience with OW...
Bernardo Cuenca Grau, Ian Horrocks, Boris Motik, B...