Sciweavers

2084 search results - page 6 / 417
» Knowledge Exploitation from the Web
Sort
View
AIED
2009
Springer
13 years 6 months ago
Exploiting Partial Problem Spaces Learned from Users' Interactions to Provide Key Tutoring Services in Procedural and Ill-Define
In previous works, we showed how sequential pattern mining can be used to extract a partial problem space from logged user interactions for a procedural and ill-defined domain wher...
Philippe Fournier-Viger, Roger Nkambou, Engelbert ...
WWW
2008
ACM
14 years 9 months ago
Protecting web services from remote exploit code: a static analysis approach
We propose STILL, a signature-free remote exploit binary code injection attack blocker to protect web servers and web applications. STILL is robust to almost all anti-signature, a...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
ICCV
2009
IEEE
15 years 2 months ago
Absolute Scale in Structure from Motion from a Single Vehicle Mounted Camera by Exploiting Nonholonomic Constraints
In structure-from-motion with a single camera it is well known that the scene can be only recovered up to a scale. In order to compute the absolute scale, one needs to know the ...
Davide Scaramuzza, Friedrich Fraundorfer, Marc Pol...
SIGIR
2009
ACM
14 years 3 months ago
Web-derived resources for web information retrieval: from conceptual hierarchies to attribute hierarchies
A weakly-supervised extraction method identifies concepts within conceptual hierarchies, at the appropriate level of specificity (e.g., Bank vs. Institution), to which attribute...
Marius Pasca, Enrique Alfonseca
SEMWEB
2010
Springer
13 years 7 months ago
Supporting Natural Language Processing with Background Knowledge: Coreference Resolution Case
Systems based on statistical and machine learning methods have been shown to be extremely effective and scalable for the analysis of large amount of textual data. However, in the r...
Volha Bryl, Claudio Giuliano, Luciano Serafini, Ka...