Sciweavers

322 search results - page 57 / 65
» Individuality of Numerals
Sort
View
ASIAMS
2008
IEEE
13 years 9 months ago
A Blended Text Mining Method for Authorship Authentication Analysis
The paper elaborates upon the interim results achieved in resolving a few newly discovered 16th century letters now alleged to be written by Queen Mary of Scots (QMS). Despite the...
Philip Sallis, Subana Shanmuganathan
ECAI
2008
Springer
13 years 9 months ago
Privacy-Preserving Query Answering in Logic-based Information Systems
Abstract. We study privacy guarantees for the owner of an information system who wants to share some of the information in the system with clients while keeping some other informat...
Bernardo Cuenca Grau, Ian Horrocks
LWA
2008
13 years 8 months ago
Towards CoPing with Information Overload
The problem of information overload has been addressed by several systems. However, many approaches are limited to informal artifacts and need to refer to the user for reference o...
Christine Müller
LWA
2007
13 years 8 months ago
Parameter Learning for a Readability Checking Tool
This paper describes the application of machine learning methods to determine parameters for DeLite, a readability checking tool. DeLite pinpoints text segments that are difficul...
Tim vor der Brück, Johannes Leveling
CSREASAM
2006
13 years 8 months ago
Session Based Logging (SBL) for IP-Traceback on Network Forensics
The widely acknowledged problem of reliably identifying the origin of information in cyberspace has been the subject of much research. Due to the nature of the Internet protocol, ...
Omer Demir, Ping Ji, Jinwoo Kim