Sciweavers

6952 search results - page 1276 / 1391
» The information integrity imperative
Sort
View
ACE
2004
193views Education» more  ACE 2004»
13 years 11 months ago
Conversational KM - Student Driven Learning
A conversational method of teaching whereby the students engage each other as a key part of the learning experience achieves a higher percentage of high grades (and presumably bet...
Marilyn A. Wells, Phillip W. Brook
ADCS
2004
13 years 11 months ago
On the Effectiveness of Relevance Profiling
Relevance profiling is a general process for withindocument retrieval. Given a query, a profile of retrieval status values is computed by sliding a fixed sized window across a doc...
David J. Harper, David Lee
DGO
2006
134views Education» more  DGO 2006»
13 years 11 months ago
Next steps in near-duplicate detection for eRulemaking
Large volume public comment campaigns and web portals that encourage the public to customize form letters produce many near-duplicate documents, which increases processing and sto...
Hui Yang, Jamie Callan, Stuart W. Shulman
DFN
2003
13 years 11 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
MDBIS
2004
149views Database» more  MDBIS 2004»
13 years 11 months ago
Enhanced User Support for Mobile Ad-hoc-Processes
: In ubiquitous application scenarios, the information (processing) needs of nomadic users often cannot be satisfied by a set of pre-installed processes like in common workflow sys...
Klaus Haller, Michelle Ackermann, Claudio Munari, ...
« Prev « First page 1276 / 1391 Last » Next »