Sciweavers

8760 search results - page 1665 / 1752
» Modeling users of intelligent systems
Sort
View
SAC
2010
ACM
15 years 11 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
SIGIR
2006
ACM
15 years 10 months ago
Mining dependency relations for query expansion in passage retrieval
Classical query expansion techniques such as the local context analysis (LCA) make use of term co-occurrence statistics to incorporate additional contextual terms for enhancing pa...
Renxu Sun, Chai-Huat Ong, Tat-Seng Chua
CIKM
2005
Springer
15 years 9 months ago
Word sense disambiguation in queries
This paper presents a new approach to determine the senses of words in queries by using WordNet. In our approach, noun phrases in a query are determined first. For each word in th...
Shuang Liu, Clement T. Yu, Weiyi Meng
ICAI
2008
15 years 5 months ago
Nonrestrictive Concept-Acquisition by Representational Redescription
coarse procedures or very abstract frames from the point of view of algorithm, because some crucial issues like the representation, evolution, storage, and learning process of conc...
Hui Wei, Yan Chen
CVIU
2007
174views more  CVIU 2007»
15 years 4 months ago
Laser-based detection and tracking of multiple people in crowds
Laser-based people tracking systems have been developed for mobile robotic, and intelligent surveillance areas. Existing systems rely on laser point clustering method to extract o...
Jinshi Cui, Hongbin Zha, Huijing Zhao, Ryosuke Shi...
« Prev « First page 1665 / 1752 Last » Next »