Sciweavers

2084 search results - page 375 / 417
» Knowledge Exploitation from the Web
Sort
View
SIGIR
2009
ACM
14 years 3 months ago
Query dependent pseudo-relevance feedback based on wikipedia
Pseudo-relevance feedback (PRF) via query-expansion has been proven to be effective in many information retrieval (IR) tasks. In most existing work, the top-ranked documents from...
Yang Xu, Gareth J. F. Jones, Bin Wang
ACSAC
2008
IEEE
14 years 3 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
ICALT
2006
IEEE
14 years 3 months ago
Mobile Technology and Content Delivery in Education
The purpose of this workshop is to identify various issues that are pertinent to the development and delivery of content in the context of mobile devices. The workshop will focus ...
Rory McGreal, Kinshuk
BMCBI
2011
13 years 4 months ago
Investigating the effect of paralogs on microarray gene-set analysis
Background: In order to interpret the results obtained from a microarray experiment, researchers often shift focus from analysis of individual differentially expressed genes to an...
Andre J. Faure, Cathal Seoighe, Nicola J. Mulder
SRDS
2008
IEEE
14 years 3 months ago
An Incremental File System Consistency Checker for Block-Level CDP Systems
A block-level continuous data protection (CDP) system logs every disk block update from an application server (e.g., a file or DBMS server) to a storage system so that any disk u...
Maohua Lu, Tzi-cker Chiueh, Shibiao Lin