Sciweavers

942 search results - page 160 / 189
» University Information System Fully Based on WWW
Sort
View
RE
2006
Springer
13 years 8 months ago
The Detection and Classification of Non-Functional Requirements with Application to Early Aspects
This paper introduces an information retrieval based approach for automating the detection and classification of non-functional requirements (NFRs). Early detection of NFRs is use...
Jane Cleland-Huang, Raffaella Settimi, Xuchang Zou...
DIM
2009
ACM
14 years 1 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
CCS
2010
ACM
13 years 8 months ago
A privacy recommendation wizard for users of social networking sites
Privacy is a huge problem for users of social networking sites. While sites like Facebook allow individual users to personalize fine-grained privacy settings, this has proven quit...
Lujun Fang, Heedo Kim, Kristen LeFevre, Aaron Tami
TREC
2004
13 years 10 months ago
UIC at TREC 2004: Robust Track
In TREC 2004, the Database and Information System Lab (DBIS) at University of Illinois at Chicago (UIC) participates in the robust track, which is a traditional ad hoc retrieval t...
Shuang Liu, Chaojing Sun, Clement T. Yu
AAAI
1996
13 years 10 months ago
An Optimal Contracting Strategy in a Digital Library
Agents can benefit from contracting some of their tasks that cannot be performedby themselves or that can be performed moreefficiently by other agents. Developing an agent's ...
Sunju Park, Edmund H. Durfee