Sciweavers

1275 search results - page 174 / 255
» A Simple Focused Crawler
Sort
View
ML
2010
ACM
155views Machine Learning» more  ML 2010»
13 years 7 months ago
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
SIAMCOMP
2010
97views more  SIAMCOMP 2010»
13 years 7 months ago
Designing Network Protocols for Good Equilibria
Designing and deploying a network protocol determines the rules by which end users interact with each other and with the network. We consider the problem of designing a protocol t...
Ho-Lin Chen, Tim Roughgarden, Gregory Valiant
TVCG
2010
130views more  TVCG 2010»
13 years 7 months ago
Route Visualization Using Detail Lenses
—We present a method designed to address some limitations of typical route map displays of driving directions. The main goal of our system is to generate a printable version of a...
Pushpak Karnick, David Cline, Stefan Jeschke, Ansh...
DLOG
2010
13 years 7 months ago
Generating Referring Expressions with OWL2
The task of generating referring expressions, an important subtask of Natural Language Generation is to generate phrases that uniquely identify domain entities. Until recently, man...
Yuan Ren, Kees van Deemter, Jeff Z. Pan
EMNLP
2010
13 years 7 months ago
The Necessity of Combining Adaptation Methods
Problems stemming from domain adaptation continue to plague the statistical natural language processing community. There has been continuing work trying to find general purpose al...
Ming-Wei Chang, Michael Connor, Dan Roth