Sciweavers

100
Voted
INFORMATICASI
2010
14 years 12 months ago
Using Bagging and Boosting Techniques for Improving Coreference Resolution
Smita Vemulapalli, Xiaoqiang Luo, John F. Pitrelli...
INFORMATICASI
2010
14 years 12 months ago
Using Meta-Structures in Database Design
Hui Ma, René Noack, Klaus-Dieter Schewe, Be...
INFORMATICASI
2010
14 years 12 months ago
Earth Observation Data Processing in Distributed Systems
Dana Petcu, Silviu Panica, Marian Neagul, Marc Fr&...
121
Voted
INFORMATICASI
2010
14 years 12 months ago
Cryptanalysis of a Simple Three-party Key Exchange Protocol
Debiao He, Jianhua Chen, Jin Hu
INFORMATICASI
2010
14 years 12 months ago
Strategic Modeling of Information Sharing among Data Privacy Attackers
Research in privacy-preserving data publishing has revealed the necessity of accounting for an adversary's background knowledge when reasoning about the protection afforded b...
Quang Duong, Kristen LeFevre, Michael P. Wellman
INFORMATICASI
2010
14 years 12 months ago
Context-based Global Expertise in Recommendation Systems
Vincenza Carchiolo, Vincenza Longheu, Michele Malg...
100
Voted
INFORMATICASI
2010
14 years 12 months ago
Automatic Identification of Lexical Units
Vidas Daudaravicius
INFORMATICASI
2010
14 years 12 months ago
Planning to Discover and Counteract Attacks
Recognizing attack plans is one of the goals of security analysts. Attack plan recognition is critical for predicting future actions of attackers, generating possible actions (i.e...
Tatiana Kichkaylo, Tatyana Ryutov, Michael D. Oros...
INFORMATICASI
2010
14 years 12 months ago
A Service Oriented Framework for Natural Language Text Enrichment
Tadej Stajner, Delia Rusu, Lorand Dali, Blaz Fortu...