Sciweavers

18697 search results - page 3634 / 3740
» Systemic Security Management
Sort
View
CLEF
2009
Springer
15 years 2 months ago
Clustering for Text and Image-Based Photo Retrieval at CLEF 2009
For this year's Image CLEF Photo Retrieval task, we have prepared 5 submission runs to help us assess the effectiveness of 1) image content-based retrieval, and 2) textbased ...
Qian Zhu, Diana Inkpen
EDM
2009
184views Data Mining» more  EDM 2009»
15 years 2 months ago
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...
GI
2009
Springer
15 years 2 months ago
Combined Optimization of Aircraft Maneuvers and RF Measurements for Passive Air-Air Ranging
: When a tactical aircraft sets out on a mission in dense airborne and surface RF (radio frequency) emitter environment, the pilot desires to minimize the use of the onboard fire c...
Ronald Matthew Yannone, Melvin Carroll
168
Voted
BMCBI
2011
14 years 11 months ago
Worm Phenotype Ontology: integrating phenotype data within and beyond the C. elegans community
Background: Caenorhabditis elegans gene-based phenotype information dates back to the 1970’s, beginning with Sydney Brenner and the characterization of behavioral and morphologi...
Gary Schindelman, Jolene Fernandes, Carol Bastiani...
CSCW
2011
ACM
14 years 11 months ago
"Not my bug!" and other reasons for software bug report reassignments
Bug reporting/fixing is an important social part of the software development process. The bug-fixing process inherently has strong inter-personal dynamics at play, especially in h...
Philip J. Guo, Thomas Zimmermann, Nachiappan Nagap...
« Prev « First page 3634 / 3740 Last » Next »