Sciweavers

1407 search results - page 229 / 282
» Systems Theory Model for Information Security
Sort
View
CIKM
2009
Springer
14 years 3 months ago
Learning to rank from Bayesian decision inference
Ranking is a key problem in many information retrieval (IR) applications, such as document retrieval and collaborative filtering. In this paper, we address the issue of learning ...
Jen-Wei Kuo, Pu-Jen Cheng, Hsin-Min Wang
SIGIR
2003
ACM
14 years 2 months ago
Table extraction using conditional random fields
The ability to find tables and extract information from them is a necessary component of data mining, question answering, and other information retrieval tasks. Documents often c...
David Pinto, Andrew McCallum, Xing Wei, W. Bruce C...
ECCV
2002
Springer
14 years 11 months ago
A Markov Chain Monte Carlo Approach to Stereovision
We propose Markov chain Monte Carlo sampling methods to address uncertainty estimation in disparity computation. We consider this problem at a postprocessing stage, i.e. once the d...
Julien Sénégas
ICSE
2008
IEEE-ACM
14 years 10 months ago
Automatic modularity conformance checking
According to Parnas's information hiding principle and Baldwin and Clark's design rule theory, the key step to decomposing a system into modules is to determine the desi...
Sunny Huynh, Yuanfang Cai, Yuanyuan Song, Kevin J....
ICSE
2008
IEEE-ACM
14 years 9 months ago
The economy of collective attention for situated knowledge collaboration in software development
Because the knowledge required for the construction of a complex software system is often widely distributed among its members, programmers routinely engage in collaboration with ...
Yunwen Ye, Kumiyo Nakakoji, Yasuhiro Yamamoto