Sciweavers

1675 search results - page 34 / 335
» The Value of a Good Name
Sort
View
ICDE
2010
IEEE
238views Database» more  ICDE 2010»
14 years 2 months ago
Correlation hiding by independence masking
— Extracting useful correlation from a dataset has been extensively studied. In this paper, we deal with the opposite, namely, a problem we call correlation hiding (CH), which is...
Yufei Tao, Jian Pei, Jiexing Li, Xiaokui Xiao, Ke ...
VOTEID
2007
Springer
14 years 1 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...
RCIS
2010
13 years 6 months ago
Evaluating cross-organizational ERP requirements engineering practices: a focus group study
This focus group study presents our first validation of practices for engineering the coordination requirements in cross­ organizational Enterprise Resource Planning (ERP) project...
Maya Daneva, Niv Ahituv
JMLR
2010
136views more  JMLR 2010»
13 years 2 months ago
Predicting the functions of proteins in Protein-Protein Interaction networks from global information
In this work we present a novel approach to predict the function of proteins in protein-protein interaction (PPI) networks. We classify existing approaches into inductive and tran...
Hossein Rahmani, Hendrik Blockeel, Andreas Bender
PRICAI
2000
Springer
13 years 11 months ago
A POMDP Approximation Algorithm That Anticipates the Need to Observe
This paper introduces the even-odd POMDP, an approximation to POMDPs in which the world is assumed to be fully observable every other time step. The even-odd POMDP can be converte...
Valentina Bayer Zubek, Thomas G. Dietterich