Sciweavers

647 search results - page 110 / 130
» Technical method of Zoetmorerope
Sort
View
AUSFORENSICS
2004
13 years 9 months ago
Generalising Event Forensics Across Multiple Domains
In cases involving computer related crime, event oriented evidence such as computer event logs, and telephone call records are coming under increased scrutiny. The amount of techn...
Bradley Schatz, George M. Mohay, Andrew Clark
IC
2003
13 years 9 months ago
WODA - A Web Services Generator
— The default storage system for the World Wide Web is the file system- the concept of a database is not built into the core of the HTTP protocols or into the HTML language. But ...
Ziga Turk
AAAI
2000
13 years 9 months ago
Exploiting a Thesaurus-Based Semantic Net for Knowledge-Based Search
With the growth of on-line information, the need for better resource location services is growing rapidly. A popular goal is to conduct search in terms of concepts, rather than wo...
Peter Clark, John Thompson, Heather Holmback, Lisb...
UAI
2003
13 years 9 months ago
Large-Sample Learning of Bayesian Networks is NP-Hard
In this paper, we provide new complexity results for algorithms that learn discrete-variable Bayesian networks from data. Our results apply whenever the learning algorithm uses a ...
David Maxwell Chickering, Christopher Meek, David ...
GRAPHICSINTERFACE
2000
13 years 9 months ago
Are We All In the Same "Bloat"?
"Bloat", a term that has existed in the technical community for many years, has recently received attention in the popular press. The term has a negative connotation imp...
Joanna McGrenere, Gale Moore