Sciweavers

1438 search results - page 268 / 288
» Feature Selection and Effective Classifiers
Sort
View
ACL
2006
13 years 9 months ago
Obfuscating Document Stylometry to Preserve Author Anonymity
This paper explores techniques for reducing the effectiveness of standard authorship attribution techniques so that an author A can preserve anonymity for a particular document D....
Gary Kacmarcik, Michael Gamon
ACL
1997
13 years 9 months ago
Deriving Verbal and Compositional Lexical Aspect for NLP Applications
Verbal and compositional lexical aspect provide the underlying temporal structure of events. Knowledge of lexical aspect, e.g., (a)telicity, is therefore required for interpreting...
Bonnie J. Dorr, Mari Broman Olsen
ICASSP
2010
IEEE
13 years 7 months ago
Semantic confidence calibration for spoken dialog applications
The success of spoken dialog applications depends strongly on the quality of the semantic confidence measure that determines the selection of the dialog strategy. However, the sem...
Dong Yu, Li Deng
CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 7 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
CORR
2006
Springer
127views Education» more  CORR 2006»
13 years 7 months ago
Space Division Multiple Access with a Sum Feedback Rate Constraint
On a multiantenna broadcast channel, simultaneous transmission to multiple users by joint beamforming and scheduling is capable of achieving high throughput, which grows double log...
Kaibin Huang, Robert W. Heath Jr., Jeffrey G. Andr...