Sciweavers

11030 search results - page 1945 / 2206
» Generative Sound Models
Sort
View
128
Voted
ICDM
2007
IEEE
147views Data Mining» more  ICDM 2007»
15 years 6 months ago
Improving Knowledge Discovery in Document Collections through Combining Text Retrieval and Link Analysis Techniques
In this paper, we present Concept Chain Queries (CCQ), a special case of text mining in document collections focusing on detecting links between two topics across text documents. ...
Wei Jin, Rohini K. Srihari, Hung Hay Ho, Xin Wu
ICFEM
2007
Springer
15 years 6 months ago
Automating Refinement Checking in Probabilistic System Design
Abstract. Refinement plays a crucial role in "top-down" styles of verification, such as the refinement calculus, but for probabilistic systems proof of refinement is a pa...
Carlos Gonzalia, Annabelle McIver
120
Voted
ACNS
2004
Springer
133views Cryptology» more  ACNS 2004»
15 years 6 months ago
Limited Verifier Signature from Bilinear Pairings
Motivated by the conflict between authenticity and privacy in the digital signature, the notion of limited verifier signature was introduced [1]. The signature can be verified by a...
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
105
Voted
ACSAC
2004
IEEE
15 years 6 months ago
Reasoning About Complementary Intrusion Evidence
This paper presents techniques to integrate and reason about complementary intrusion evidence such as alerts generated by intrusion detection systems (IDSs) and reports by system ...
Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeve...
APSEC
2004
IEEE
15 years 6 months ago
A Systematic Method to Instantiate Core Assets in Product Line Engineering
Product line engineering (PLE) is one of the recent and effective reuse approaches, and it consists of two processes; framework engineering and application engineering. Framework ...
Soo Dong Kim, Soo Ho Chang, Chee Won Chang
« Prev « First page 1945 / 2206 Last » Next »