Sciweavers

861 search results - page 133 / 173
» Predicting Attack-prone Components
Sort
View
AAAI
2004
13 years 9 months ago
CMRadar: A Personal Assistant Agent for Calendar Management
Abstract. Personal assistant agents have long promised to automate routine everyday tasks in order to reduce the cognitive load on humans. One such routine task is the management o...
Pragnesh Jay Modi, Manuela M. Veloso, Stephen F. S...
ACL
2006
13 years 9 months ago
Semantic Taxonomy Induction from Heterogenous Evidence
We propose a novel algorithm for inducing semantic taxonomies. Previous algorithms for taxonomy induction have typically focused on independent classifiers for discovering new sin...
Rion Snow, Daniel Jurafsky, Andrew Y. Ng
ECIS
2004
13 years 9 months ago
A conceptual model of customer value in e-commerce
Customer value is crucial in predicting customer choice in traditional consumer behavior research. However, online customer value can be different from its offline counterpart bec...
Yunjie Xu, Shun Cai
ALENEX
2001
215views Algorithms» more  ALENEX 2001»
13 years 9 months ago
An Empirical Study of a New Approach to Nearest Neighbor Searching
In nearest neighbor searching we are given a set of n data points in real d-dimensional space, d , and the problem is to preprocess these points into a data structure, so that give...
Songrit Maneewongvatana, David M. Mount
FMOODS
2003
13 years 9 months ago
Design and Verification of Distributed Multi-media Systems
Performance analysis of computing systems, in particular distributed computing systems, is a complex process. Analysing the complex flows and interactions between a set of distribu...
David H. Akehurst, John Derrick, A. Gill Waters