Sciweavers

521 search results - page 66 / 105
» A Probabilistic Framework for Answer Selection in Question A...
Sort
View
VLDB
2005
ACM
139views Database» more  VLDB 2005»
14 years 1 months ago
Tree-Pattern Queries on a Lightweight XML Processor
Popular XML languages, like XPath, use “treepattern” queries to select nodes based on their structural characteristics. While many processing methods have already been propose...
Mirella Moura Moro, Zografoula Vagena, Vassilis J....
USS
2008
13 years 10 months ago
FLAME: A Flow-Level Anomaly Modeling Engine
There are several remaining open questions in the area of flow-based anomaly detection, e.g., how to do meaningful evaluations of anomaly detection mechanisms; how to get conclusi...
Daniela Brauckhoff, Arno Wagner, Martin May
DIM
2008
ACM
13 years 9 months ago
Quantifying the security of preference-based authentication
We describe a technique aimed at addressing longstanding problems for password reset: security and cost. In our approach, users are authenticated using their preferences. Experime...
Markus Jakobsson, Liu Yang, Susanne Wetzel
RANLP
2003
13 years 9 months ago
Roget's thesaurus and semantic similarity
Roget’s Thesaurus has not been sufficiently appreciated in Natural Language Processing. We show that Roget's and WordNet are birds of a feather. In a few typical tests, we ...
Mario Jarmasz, Stan Szpakowicz
ESE
2002
114views Database» more  ESE 2002»
13 years 7 months ago
An Industrial Case Study to Examine a Non-Traditional Inspection Implementation for Requirements Specifications
Software inspection is one of the key enablers for quality improvement and defect cost reduction. Although its benefits are shown in many studies, a major obstacle to implement an...
Oliver Laitenberger, Thomas Beil, Thilo Schwinn