Sciweavers

524 search results - page 34 / 105
» Why phishing works
Sort
View
ECIS
2004
13 years 10 months ago
Reflections on technology acceptance in higher education
The use of new information technology impacts individual work as well as the whole organization. This paper illuminates some preliminary findings from an ongoing study about impac...
Jyri Naarmala
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
11 years 11 months ago
Searching and mining trillions of time series subsequences under dynamic time warping
Most time series data mining algorithms use similarity search as a core subroutine, and thus the time taken for similarity search is the bottleneck for virtually all time series d...
Thanawin Rakthanmanon, Bilson J. L. Campana, Abdul...
ISPW
2005
IEEE
14 years 2 months ago
Software are Processes Too
A process defines the way activities are organized, managed, measured, supported and improved to reach a goal. It has been shown, 15 years ago [1] that processes are software too; ...
Jacky Estublier
ICDE
2009
IEEE
122views Database» more  ICDE 2009»
14 years 10 months ago
Universal Resource Lifecycle Management
This paper presents a model and a tool that allows Web users to define, execute, and manage lifecycles for any artifact available on the Web. In the paper we show the need for life...
Marcos Báez, Fabio Casati, Maurizio Marches...
ESWS
2009
Springer
14 years 3 months ago
Towards Linguistically Grounded Ontologies
Abstract. In this paper we argue why it is necessary to associate linguistic information with ontologies and why more expressive models, beyond RDFS, OWL and SKOS, are needed to ca...
Paul Buitelaar, Philipp Cimiano, Peter Haase, Mich...