Sciweavers

209 search results - page 11 / 42
» A Novel Approach to Propagating Distrust
Sort
View
BDIM
2008
IEEE
141views Business» more  BDIM 2008»
13 years 9 months ago
IT confidentiality risk assessment for an architecture-based approach
Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic as...
Ayse Morali, Emmanuele Zambon, Sandro Etalle, Paul...
ACL
2006
13 years 8 months ago
Named Entity Transliteration with Comparable Corpora
In this paper we investigate ChineseEnglish name transliteration using comparable corpora, corpora where texts in the two languages deal in some of the same topics -- and therefor...
Richard Sproat, Tao Tao, ChengXiang Zhai
JAIR
2011
88views more  JAIR 2011»
12 years 10 months ago
From "Identical" to "Similar": Fusing Retrieved Lists Based on Inter-Document Similarities
We present a novel approach to fusing document lists that are retrieved in response to a query. Our approach is based on utilizing information induced from inter-document similarit...
Anna Khudyak Kozorovitzky, Oren Kurland
SECURWARE
2008
IEEE
14 years 1 months ago
Email Worm Mitigation by Controlling the Name Server Response Rate
Email worms and the spam associated with them are one of the main operational security issues today because they waste time, money and resources. The high incidence of email worms...
Nikolaos Chatzis, Enric Pujol
ICAI
2008
13 years 8 months ago
A Tabu Based Neural Network Training Algorithm for Equalization of Communication Channels
: This paper presents a new approach to equalization of communication channels using Artificial Neural Networks (ANNs). A novel method of training the ANNs using Tabu based Back Pr...
Jitendriya Kumar Satapathy, Konidala Ratna Subhash...