Sciweavers

3011 search results - page 270 / 603
» Generating XML Based Specifications of Information Systems
Sort
View
135
Voted
EMNLP
2010
15 years 1 months ago
Domain Adaptation of Rule-Based Annotators for Named-Entity Recognition Tasks
Named-entity recognition (NER) is an important task required in a wide variety of applications. While rule-based systems are appealing due to their well-known "explainability...
Laura Chiticariu, Rajasekar Krishnamurthy, Yunyao ...
ISI
2006
Springer
15 years 3 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
101
Voted
GLOBECOM
2006
IEEE
15 years 9 months ago
On the Effectiveness of Service Registration-Based Worm Defense
— Existing Internet worm research focuses either on worm detection inside an AS, or on prevention of Internet-wide worm epidemic. But of more practical concern is how to repel wo...
Jin-Ho Kim, Hyogon Kim, Saewoong Bahk
132
Voted
ICONIP
2008
15 years 4 months ago
A Novel Approach for Hardware Based Sound Classification
Several applications would emerge from the development of efficient and robust sound classification systems able to identify the nature of non-speech sound sources. This paper prop...
Mauricio Kugler, Victor Alberto Parcianello Benso,...
EWCBR
2008
Springer
15 years 5 months ago
Conversational Case-Based Recommendations Exploiting a Structured Case Model
There are case-based recommender systems that generate personalized recommendations for users exploiting the knowledge contained in past recommendation cases. These systems assume ...
Quang Nhat Nguyen, Francesco Ricci