Sciweavers

111 search results - page 15 / 23
» Deploying SDP for machine learning
Sort
View
CIKM
2008
Springer
13 years 9 months ago
Trada: tree based ranking function adaptation
Machine Learned Ranking approaches have shown successes in web search engines. With the increasing demands on developing effective ranking functions for different search domains, ...
Keke Chen, Rongqing Lu, C. K. Wong, Gordon Sun, La...
SIGCSE
2010
ACM
186views Education» more  SIGCSE 2010»
14 years 2 months ago
Teaching operating systems using virtual appliances and distributed version control
Students learn more through hands-on project experience for computer science courses such as operating systems, but providing the infrastructure support for a large class to learn...
Oren Laadan, Jason Nieh, Nicolas Viennot
BLISS
2009
IEEE
13 years 8 months ago
Autonomous Physical Secret Functions and Clone-Resistant Identification
Self configuring VLSI technology architectures offer a new environment for creating novel security functions. Two such functions for physical security architectures are proposed t...
Wael Adi
ISMIS
2005
Springer
14 years 1 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
JAIR
2008
118views more  JAIR 2008»
13 years 7 months ago
On the Use of Automatically Acquired Examples for All-Nouns Word Sense Disambiguation
This article focuses on Word Sense Disambiguation (WSD), which is a Natural Language Processing task that is thought to be important for many Language Technology applications, suc...
David Martínez, Oier Lopez de Lacalle, Enek...