Sciweavers

1827 search results - page 359 / 366
» Automatic thesaurus construction
Sort
View
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 9 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
JUCS
2008
143views more  JUCS 2008»
13 years 9 months ago
Market Microstructure Patterns Powering Trading and Surveillance Agents
: Market Surveillance plays important mechanism roles in constructing market models. From data analysis perspective, we view it valuable for smart trading in designing legal and pr...
Longbing Cao, Yuming Ou
JUCS
2008
123views more  JUCS 2008»
13 years 9 months ago
Beyond ASCII - Parsing Programs with Graphical Presentations
: Proxima is a generic structure editor suitable for a wide range of structured document types. It allows edit operations on the document structure as well as on its screen represe...
Martijn M. Schrage, S. Doaitse Swierstra
JUCS
2006
94views more  JUCS 2006»
13 years 9 months ago
UML-Based Modeling of Data-oriented WEB Applications
Abstract: Recently a growing demand has arisen for methods for the development of smalland medium scale Web Information Systems (WIS). Web applications are being built in a rapidly...
Attila Adamkó
IJSWIS
2007
138views more  IJSWIS 2007»
13 years 9 months ago
Using a Natural Language Understanding System to Generate Semantic Web Content
We describe our research on automatically generating rich semantic annotations of text and making it available on the Semantic Web. In particular, we discuss the challenges involv...
Akshay Java, Sergei Nirenburg, Marjorie McShane, T...