Sciweavers

94 search results - page 16 / 19
» Much to Know About History
Sort
View
ALT
2011
Springer
12 years 7 months ago
On the Expressive Power of Deep Architectures
Deep architectures are families of functions corresponding to deep circuits. Deep Learning algorithms are based on parametrizing such circuits and tuning their parameters so as to ...
Yoshua Bengio, Olivier Delalleau
EACL
2006
ACL Anthology
13 years 8 months ago
Determining Term Subjectivity and Term Orientation for Opinion Mining
Opinion mining is a recent subdiscipline of computational linguistics which is concerned not with the topic a document is about, but with the opinion it expresses. To aid the extr...
Andrea Esuli, Fabrizio Sebastiani
TNC
2004
120views Education» more  TNC 2004»
13 years 8 months ago
Realtime Intrusion-Forensics: A First Prototype Implementation (based on a stack-based NIDS)
The function of a Network Intrusion Detection System (NIDS) is to identify any misuse and abnormal behavior determined as an attack to a network segment or network host. The propo...
Udo Payer
CIDR
2009
129views Algorithms» more  CIDR 2009»
13 years 8 months ago
Extracting and Querying a Comprehensive Web Database
Recent research in domain-independent information extraction holds the promise of an automatically-constructed structured database derived from the Web. A query system based on th...
Michael J. Cafarella
CCS
2009
ACM
14 years 1 months ago
English shellcode
History indicates that the security community commonly takes a divide-and-conquer approach to battling malware threats: identify the essential and inalienable components of an att...
Joshua Mason, Sam Small, Fabian Monrose, Greg MacM...