Sciweavers

52 search results - page 9 / 11
» Finding the Sources and Targets of Subjective Expressions
Sort
View
AND
2009
13 years 6 months ago
Kernel-based relation extraction from investigative data
In a specific process of business intelligence, i.e. investigation on organized crime, empirical language processing technologies can play a crucial role. In the data used on inve...
Cristina Giannone, Roberto Basili, Chiara Del Vesc...
KDD
2006
ACM
381views Data Mining» more  KDD 2006»
14 years 9 months ago
GPLAG: detection of software plagiarism by program dependence graph analysis
Along with the blossom of open source projects comes the convenience for software plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open source pr...
Chao Liu 0001, Chen Chen, Jiawei Han, Philip S. Yu
WWW
2010
ACM
13 years 8 months ago
Cross-domain sentiment classification via spectral feature alignment
Sentiment classification aims to automatically predict sentiment polarity (e.g., positive or negative) of users publishing sentiment data (e.g., reviews, blogs). Although traditio...
Sinno Jialin Pan, Xiaochuan Ni, Jian-Tao Sun, Qian...
BMCBI
2008
132views more  BMCBI 2008»
13 years 8 months ago
Exon level integration of proteomics and microarray data
Background: Previous studies comparing quantitative proteomics and microarray data have generally found poor correspondence between the two. We hypothesised that this might in par...
Danny A. Bitton, Michal J. Okoniewski, Yvonne Conn...
DIMVA
2010
13 years 10 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...