Sciweavers

155 search results - page 27 / 31
» CRAWDAD workshop 2007
Sort
View
ICETE
2004
253views Business» more  ICETE 2004»
13 years 8 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
NAACL
2003
13 years 8 months ago
Evaluating the Evaluation: A Case Study Using the TREC 2002 Question Answering Track
Evaluating competing technologies on a common problem set is a powerful way to improve the state of the art and hasten technology transfer. Yet poorly designed evaluations can was...
Ellen M. Voorhees
NAACL
1994
13 years 8 months ago
Session 10: Government Panel
The Workshop included an extended group of presentations by selected US government agencies and an invited guest from the European Community. These presentations, amplified in the...
Oscar N. Garcia
UAI
2007
13 years 8 months ago
"I Can Name that Bayesian Network in Two Matrixes!"
The traditional approach to building Bayesian networks is to build the graphical structure using a graphical editor and then add probabilities using a separate spreadsheet for eac...
Russell Almond
BMCBI
2008
83views more  BMCBI 2008»
13 years 7 months ago
Terminologies for text-mining; an experiment in the lipoprotein metabolism domain
Background: The engineering of ontologies, especially with a view to a text-mining use, is still a new research field. There does not yet exist a well-defined theory and technolog...
Dimitra Alexopoulou, Thomas Wächter, Laura Pi...