Sciweavers

327 search results - page 66 / 66
» How to Evaluate Social Intelligence Design
Sort
View
IMC
2009
ACM
14 years 2 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
SIGIR
2010
ACM
13 years 5 months ago
EUSUM: extracting easy-to-understand english summaries for non-native readers
In this paper we investigate a novel and important problem in multi-document summarization, i.e., how to extract an easy-tounderstand English summary for non-native readers. Exist...
Xiaojun Wan, Huiying Li, Jianguo Xiao