Sciweavers

114 search results - page 13 / 23
» The Tradeoffs Between Open and Traditional Relation Extracti...
Sort
View
IJCAI
1997
13 years 9 months ago
Middle-Agents for the Internet
Like middle-men in physical commerce, middleagents support the flow of information in electronic commerce, assisting in locating and connecting the ultimate information provider ...
Keith Decker, Katia P. Sycara, Mike Williamson
ISI
2008
Springer
13 years 7 months ago
Information sharing and privacy protection of terrorist or criminal social networks
Terrorist or criminal social network analysis is helpful for intelligence and law enforcement force in investigation. However, individual agency usually has part of the complete te...
Christopher C. Yang
KER
2006
70views more  KER 2006»
13 years 7 months ago
A theoretical inter-organizational trust-based security model
This work examines the interplay of inter-personal and inter-organizational trust, two distinct but related concepts, through a theoretic inter-organizational trust-based security...
Henry Hexmoor, Seth Wilson, Sandeep Bhattaram
ICCS
2004
Springer
14 years 1 months ago
Improving Generalization Level in UML Models Iterative Cross Generalization in Practice
FCA has been successfully applied to software engineering tasks such as source code analysis and class hierarchy re-organization. Most notably, FCA hematics behind the mechanism of...
Michel Dao, Marianne Huchard, Mohamed Rouane Hacen...
ACL
2003
13 years 9 months ago
An Evaluation Method of Words Tendency using Decision Tree
In every text, some words have frequency appearance and are considered as keywords because they have strong relationship with the subjects of their texts, these words frequencies ...
El-Sayed Atlam, Masaki Oono, Jun-Ichi Aoe