Sciweavers

781 search results - page 118 / 157
» An Integrated Model for Hybrid Securities
Sort
View
ISF
2008
114views more  ISF 2008»
13 years 8 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
BMCBI
2006
94views more  BMCBI 2006»
13 years 8 months ago
Fly-DPI: database of protein interactomes for D. melanogaster in the approach of systems biology
Background: Proteins control and mediate many biological activities of cells by interacting with other protein partners. This work presents a statistical model to predict protein ...
Chung-Yen Lin, Shu-Hwa Chen, Chi-Shiang Cho, Chia-...
TNN
1998
125views more  TNN 1998»
13 years 8 months ago
Symbolic connectionism in natural language disambiguation
Abstract—Natural language understanding involves the simultaneous consideration of a large number of different sources of information. Traditional methods employed in language an...
Samuel W. K. Chan, James Franklin
ADAPTIVE
2007
Springer
14 years 2 months ago
Data Mining for Web Personalization
Abstract. In this chapter we present an overview of Web personalization process viewed as an application of data mining requiring support for all the phases of a typical data minin...
Bamshad Mobasher
FLAIRS
2007
13 years 11 months ago
Combining Machine Learning with Linguistic Heuristics for Chinese Word Segmentation
This paper describes a hybrid model that combines machine learning with linguistic heuristics for integrating unknown word identification with Chinese word segmentation. The model...
Xiaofei Lu