Sciweavers

1056 search results - page 82 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
JNW
2008
118views more  JNW 2008»
13 years 8 months ago
The Derivation and Use of a Scalable Model for Network Attack Identification and Path Prediction
The rapid growth of the Internet has triggered an explosion in the number of applications that leverage its capabilities. Unfortunately, many are designed to burden o infrastructur...
Sanjeeb Nanda, Narsingh Deo
RTS
2010
90views more  RTS 2010»
13 years 8 months ago
A timeband framework for modelling real-time systems
Abstract Complex real-time systems, must integrate physical processes with digital control, human operation and organizational structures. New scientific foundations are required ...
Alan Burns, Ian J. Hayes
ACL
2010
13 years 8 months ago
Hierarchical Sequential Learning for Extracting Opinions and Their Attributes
Automatic opinion recognition involves a number of related tasks, such as identifying the boundaries of opinion expression, determining their polarity, and determining their inten...
Yejin Choi, Claire Cardie
EMNLP
2010
13 years 8 months ago
Unsupervised Discovery of Negative Categories in Lexicon Bootstrapping
Multi-category bootstrapping algorithms were developed to reduce semantic drift. By extracting multiple semantic lexicons simultaneously, a category's search space may be res...
Tara McIntosh
IOR
2011
175views more  IOR 2011»
13 years 5 months ago
Clique Relaxations in Social Network Analysis: The Maximum k-Plex Problem
This paper introduces and studies the maximum k-plex problem, which arises in social network analysis and has wider applicability in several important areas employing graph-based ...
Balabhaskar Balasundaram, Sergiy Butenko, Illya V....