Sciweavers

INFORMATICASI
2010
13 years 8 months ago
Using Bagging and Boosting Techniques for Improving Coreference Resolution
Smita Vemulapalli, Xiaoqiang Luo, John F. Pitrelli...
INFORMATICASI
2010
13 years 8 months ago
Using Meta-Structures in Database Design
Hui Ma, René Noack, Klaus-Dieter Schewe, Be...
INFORMATICASI
2010
13 years 8 months ago
Earth Observation Data Processing in Distributed Systems
Dana Petcu, Silviu Panica, Marian Neagul, Marc Fr&...
INFORMATICASI
2010
13 years 8 months ago
Strategic Modeling of Information Sharing among Data Privacy Attackers
Research in privacy-preserving data publishing has revealed the necessity of accounting for an adversary's background knowledge when reasoning about the protection afforded b...
Quang Duong, Kristen LeFevre, Michael P. Wellman
INFORMATICASI
2010
13 years 8 months ago
Context-based Global Expertise in Recommendation Systems
Vincenza Carchiolo, Vincenza Longheu, Michele Malg...
INFORMATICASI
2010
13 years 8 months ago
Planning to Discover and Counteract Attacks
Recognizing attack plans is one of the goals of security analysts. Attack plan recognition is critical for predicting future actions of attackers, generating possible actions (i.e...
Tatiana Kichkaylo, Tatyana Ryutov, Michael D. Oros...