Sciweavers

290 search results - page 25 / 58
» Leveraged Quality Assessment using Information Retrieval Tec...
Sort
View
IRI
2007
IEEE
14 years 1 months ago
Natural Language Processing and e-Government: Extracting Reusable Crime Report Information
Crime reporting needs to be possible 24/7. Although 911 and tip-lines are the most publicized reporting mechanisms, several other options exist, ranging from inperson reporting to...
Alicia Iriberri, Gondy Leroy
CEC
2009
IEEE
14 years 2 months ago
Structure learning and optimisation in a Markov-network based estimation of distribution algorithm
—Structure learning is a crucial component of a multivariate Estimation of Distribution algorithm. It is the part which determines the interactions between variables in the proba...
Alexander E. I. Brownlee, John A. W. McCall, Siddh...
EDBT
2009
ACM
184views Database» more  EDBT 2009»
14 years 2 months ago
Distributed similarity search in high dimensions using locality sensitive hashing
In this paper we consider distributed K-Nearest Neighbor (KNN) search and range query processing in high dimensional data. Our approach is based on Locality Sensitive Hashing (LSH...
Parisa Haghani, Sebastian Michel, Karl Aberer
WWW
2009
ACM
14 years 8 months ago
Extracting community structure through relational hypergraphs
Social media websites promote diverse user interaction on media objects as well as user actions with respect to other users. The goal of this work is to discover community structu...
Yu-Ru Lin, Jimeng Sun, Paul Castro, Ravi B. Konuru...
SP
2007
IEEE
14 years 1 months ago
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing
In this paper, we present ShieldGen, a system for automatically generating a data patch or a vulnerability signature for an unknown vulnerability, given a zero-day attack instance...
Weidong Cui, Marcus Peinado, Helen J. Wang, Michae...