Sciweavers

53 search results - page 7 / 11
» Intrusion detection using text processing techniques with a ...
Sort
View
IMC
2009
ACM
14 years 2 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
SEMWEB
2010
Springer
13 years 5 months ago
Exploiting Relation Extraction for Ontology Alignment
When multiple ontologies are used within one application system, aligning the ontologies is a prerequisite for interoperability and unhampered semantic navigation and search. Vario...
Elena Beisswanger
ICAI
2004
13 years 9 months ago
Using Fuzzy Clustering for Real-time Space Flight Safety
To ensure space flight safety, it is necessary to monitor myriad sensor readings on the ground and in flight. Since a space shuttle has many sensors, monitoring data and drawing c...
Charles Lee, Darrin M. Hanna, Richard E. Haskell, ...
ICIP
2006
IEEE
14 years 9 months ago
Topic Tracking Across Broadcast News Videos with Visual Duplicates and Semantic Concepts
Videos from distributed sources (e.g., broadcasts, podcasts, blogs, etc.) have grown exponentially. Topic threading is very useful for organizing such large-volume information sou...
Winston H. Hsu, Shih-Fu Chang
ACMICEC
2007
ACM
168views ECommerce» more  ACMICEC 2007»
13 years 12 months ago
Designing novel review ranking systems: predicting the usefulness and impact of reviews
With the rapid growth of the Internet, users' ability to publish content has created active electronic communities that provide a wealth of product information. Consumers nat...
Anindya Ghose, Panagiotis G. Ipeirotis