Sciweavers

749 search results - page 106 / 150
» The ethical nature of critical research in information syste...
Sort
View
NLDB
2007
Springer
14 years 4 months ago
Developing Methods and Heuristics with Low Time Complexities for Filtering Spam Messages
In this paper, we propose methods and heuristics having high accuracies and low time complexities for filtering spam e-mails. The methods are based on the n-gram approach and a heu...
Tunga Güngör, Ali Çiltik
NLDB
2007
Springer
14 years 4 months ago
Generating Ontologies Via Language Components and Ontology Reuse
Realizing the Semantic Web involves creating ontologies, a tedious and costly challenge. Reuse can reduce the cost of ontology engineering. Ontologies already created in recent Sem...
Yihong Ding, Deryle W. Lonsdale, David W. Embley, ...
ICAIL
2005
ACM
14 years 3 months ago
Automatic Legal Text Summarisation: Experiments with Summary Structuring
We describe a set of experiments using machine learning techniques for the task of extractive summarisation. The research is part of a summarisation project for which we use a cor...
Ben Hachey, Claire Grover
ACE
2004
188views Education» more  ACE 2004»
13 years 11 months ago
A Computing Education Vision for the Sight Impaired
Vision is the main sensory modality employed in learning. Teaching materials in the areas of information technology and computer engineering are highly visual in nature and vision...
Iain Murray, Helen Armstrong
QEST
2005
IEEE
14 years 3 months ago
Workload Propagation - Overload in Bursty Servers
Internet servers are developing into complex but central components in the information infrastructure and are accessed by an ever-increasing and diversified user population. As s...
Qi Zhang, Alma Riska, Erik Riedel