Sciweavers

6884 search results - page 131 / 1377
» The macro-structure of use of help
Sort
View
ISI
2006
Springer
13 years 9 months ago
Content Analysis of Jihadi Extremist Groups' Videos
This paper presents an exploratory study of jihadi extremist groups' videos using content analysis and a multimedia coding tool to explore the types of videos, groups' mo...
Arab Salem, Edna Reid, Hsinchun Chen
JAIR
2007
108views more  JAIR 2007»
13 years 9 months ago
Discovering Classes of Strongly Equivalent Logic Programs
We report on a successful experiment of computeraided theorem discovery in the area of logic programming with answer set semantics. Specifically, with the help of computers, we d...
Fangzhen Lin, Yin Chen
CORR
2008
Springer
127views Education» more  CORR 2008»
13 years 8 months ago
Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks
The Sybil attack in unknown port networks such as wireless is not considered tractable. A wireless node is not capable of independently differentiating the universe of real nodes f...
Adnan Vora, Mikhail Nesterenko, Sébastien T...
PVLDB
2008
120views more  PVLDB 2008»
13 years 8 months ago
On the provenance of non-answers to queries over extracted data
In information extraction, uncertainty is ubiquitous. For this reason, it is useful to provide users querying extracted data with explanations for the answers they receive. Provid...
Jiansheng Huang, Ting Chen, AnHai Doan, Jeffrey F....
JSS
2010
215views more  JSS 2010»
13 years 7 months ago
Analyzing architectural styles
The backbone of many software architectures and component integration frameworks is an architectural style that provides a domain-specific design vocabulary and a set of constrai...
Jung Soo Kim, David Garlan