Sciweavers

1134 search results - page 210 / 227
» Analyzing Mapping Extraction Approaches
Sort
View
ACSAC
2003
IEEE
13 years 10 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...
NIPS
2007
13 years 8 months ago
Mining Internet-Scale Software Repositories
Large repositories of source code create new challenges and opportunities for statistical machine learning. Here we first develop Sourcerer, an infrastructure for the automated c...
Erik Linstead, Paul Rigor, Sushil Krishna Bajracha...
RIAO
2007
13 years 8 months ago
Selecting Automatically the Best Query Translations
In order to search corpora written in two or more languages, the simplest and most efficient approach is to translate the query submitted into the required language(s). To achieve...
Pierre-Yves Berger, Jacques Savoy
CLEF
2010
Springer
13 years 7 months ago
Overview of ResPubliQA 2010: Question Answering Evaluation over European Legislation
This paper describes the second round of ResPubliQA, a Question Answering (QA) evaluation task over European legislation, a LAB of CLEF 2010. Two tasks have been proposed this year...
Anselmo Peñas, Pamela Forner, Álvaro...
SIGIR
2008
ACM
13 years 6 months ago
SpotSigs: robust and efficient near duplicate detection in large web collections
Motivated by our work with political scientists who need to manually analyze large Web archives of news sites, we present SpotSigs, a new algorithm for extracting and matching sig...
Martin Theobald, Jonathan Siddharth, Andreas Paepc...