Sciweavers

1353 search results - page 231 / 271
» Securing Current and Future Process Control Systems
Sort
View
141
Voted
KDD
2008
ACM
156views Data Mining» more  KDD 2008»
16 years 3 months ago
Unsupervised deduplication using cross-field dependencies
Recent work in deduplication has shown that collective deduplication of different attribute types can improve performance. But although these techniques cluster the attributes col...
Robert Hall, Charles A. Sutton, Andrew McCallum
ICCBR
2005
Springer
15 years 8 months ago
A Knowledge-Intensive Method for Conversational CBR
In conversational case-based reasoning (CCBR), a main problem is how to select the most discriminative questions and display them to users in a natural way to alleviate users’ co...
Mingyang Gu, Agnar Aamodt
155
Voted
COOPIS
2003
IEEE
15 years 8 months ago
Porting OMTTs to CORBA
The Common Object Request Broker Architecture standardizes a platform- and programming-language-independent distributed object computing environment. It also provides a standard fo...
Raul Silaghi, Alfred Strohmeier, Jörg Kienzle
118
Voted
EDBTW
2010
Springer
15 years 7 months ago
ODBIS: towards a platform for on-demand business intelligence services
In recent years, Software-as-a-Service (SaaS) is gaining momentum with more and more successful adoptions. Several companies including some well known names have embraced this new...
Moez Essaidi
138
Voted
IPPS
2007
IEEE
15 years 9 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...