Sciweavers

536 search results - page 61 / 108
» Quality evaluation in information systems outsourcing
Sort
View
ATAL
2001
Springer
14 years 29 days ago
Simple Negotiating Agents in Complex Games:
We present a simple model of distributed multi-agent multi-issued contract negotiation for open systems where interactions are competitive and information is private and not shared...
Peyman Faratin, Mark Klein, Hiroki Sayama, Yaneer ...
LREC
2008
128views Education» more  LREC 2008»
13 years 10 months ago
JURISDIC: Polish Speech Database for Taking Dictation of Legal Texts
The paper provides an overview of the Polish Speech Database for taking dictation of legal texts, created for the purpose of LVCSR system for Polish. It presents background inform...
Grazyna Demenko, Stefan Grocholewski, Katarzyna Kl...
IJNSEC
2010
141views more  IJNSEC 2010»
13 years 3 months ago
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
In this paper we present an intrusion detection engine comprised of two main elements; firstly, a neural network for the actual detection task and secondly watermarking techniques...
Aikaterini Mitrokotsa, Nikos Komninos, Christos Do...
WEBDB
2010
Springer
152views Database» more  WEBDB 2010»
14 years 1 months ago
Popularity-Guided Top-k Extraction of Entity Attributes
Recent progress in information extraction technology has enabled a vast array of applications that rely on structured data that is embedded in natural-language text. In particular...
Matthew Solomon, Cong Yu, Luis Gravano
RECSYS
2010
ACM
13 years 6 months ago
Merging multiple criteria to identify suspicious reviews
Assessing the trustworthiness of reviews is a key issue for the maintainers of opinion sites such as TripAdvisor, given the rewards that can be derived from posting false or biase...
Guangyu Wu, Derek Greene, Padraig Cunningham