Sciweavers

CIKM
2007
Springer
14 years 3 months ago
Hypothesis testing with incomplete relevance judgments
Information retrieval experimentation generally proceeds in a cycle of development, evaluation, and hypothesis testing. Ideally, the evaluation and testing phases should be short ...
Ben Carterette, Mark D. Smucker
CIKM
2007
Springer
14 years 3 months ago
A segment-based hidden markov model for real-setting pinyin-to-chinese conversion
Hidden markov model (HMM) is frequently used for Pinyin-toChinese conversion. But it only captures the dependency with the preceding character. Higher order markov models can brin...
Xiaohua Zhou, Xiaohua Hu, Xiaodan Zhang, Xiajiong ...
CIKM
2007
Springer
14 years 3 months ago
A comparison of statistical significance tests for information retrieval evaluation
Information retrieval (IR) researchers commonly use three tests of statistical significance: the Student's paired t-test, the Wilcoxon signed rank test, and the sign test. Ot...
Mark D. Smucker, James Allan, Ben Carterette
CAISE
2007
Springer
14 years 3 months ago
Formalization and Verification of EPCs with OR-Joins Based on State and Context
The semantics of the OR-join in business process modeling languages like EPCs or YAWL have been discussed for a while. Still, the existing solutions suffer from at least one of two...
Jan Mendling, Wil M. P. van der Aalst
CAISE
2007
Springer
14 years 3 months ago
Deciding to Adopt Requirements Traceability in Practice
The use of requirements traceability for information systems development (ISD) projects is not very common in practice despite its often mentioned advantages in the literature. We ...
Floris Blaauboer, Klaas Sikkel, Mehmet N. Aydin
CAISE
2007
Springer
14 years 3 months ago
Specification and Verification of Authorization Policies for Web Services Composition
The management and maintenance of a large number of Web services is not easy and, in particular, needs appropriate authorization policies to be defined so as to realize reliable an...
Mohsen Rouached, Claude Godart
CAISE
2007
Springer
14 years 3 months ago
A Blackboard Architecture for Workflows
Abstract. Most of today's business applications have to deal with automated workflows. In this paper, we argue that the blackboard pattern can be used to create an architectur...
Stefan Kleine Stegemann, Burkhardt Funk, Thomas Sl...
IPMU
2010
Springer
14 years 3 months ago
Credal Sets Approximation by Lower Probabilities: Application to Credal Networks
Abstract. Credal sets are closed convex sets of probability mass functions. The lower probabilities specified by a credal set for each element of the power set can be used as cons...
Alessandro Antonucci, Fabio Cuzzolin
IPMU
2010
Springer
14 years 3 months ago
Short-Time Prediction Based on Recognition of Fuzzy Time Series Patterns
This article proposes knowledge-based short-time prediction methods for multivariate streaming time series, relying on the early recognition of local patterns. A parametric, well-i...
Gernot Herbst, Steffen F. Bocklisch
IPMU
2010
Springer
14 years 3 months ago
Modelling Patterns of Evidence in Bayesian Networks: A Case-Study in Classical Swine Fever
Upon engineering a Bayesian network for the early detection of Classical Swine Fever in pigs, we found that the commonly used approach of separately modelling the relevant observab...
Linda C. van der Gaag, Janneke H. Bolt, Willie Loe...