Sciweavers

1089 search results - page 73 / 218
» Patterns for the Pragmatic Web
Sort
View
MOBILITY
2009
ACM
14 years 1 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
LREC
2010
146views Education» more  LREC 2010»
13 years 10 months ago
Using Dialogue Corpora to Extend Information Extraction Patterns for Natural Language Understanding of Dialogue
This paper examines how Natural Language Process (NLP) resources and online dialogue corpora can be used to extend coverage of Information Extraction (IE) templates in a Spoken Di...
Roberta Catizone, Alexiei Dingli, Robert J. Gaizau...
SDM
2010
SIAM
115views Data Mining» more  SDM 2010»
13 years 10 months ago
Radius Plots for Mining Tera-byte Scale Graphs: Algorithms, Patterns, and Observations
Given large, multi-million node graphs (e.g., FaceBook, web-crawls, etc.), how do they evolve over time? How are they connected? What are the central nodes and the outliers of the...
U. Kang, Charalampos E. Tsourakakis, Ana Paula App...
MEDINFO
2007
116views Healthcare» more  MEDINFO 2007»
13 years 10 months ago
Knowledge-Level Querying of Temporal Patterns in Clinical Research Systems
Managing time-stamped data is essential to clinical research activities and often requires the use of considerable domain knowledge, which is difficult to support within database ...
Martin J. O'Connor, Ravi D. Shankar, David B. Parr...
ESE
2008
112views Database» more  ESE 2008»
13 years 9 months ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey