Sciweavers

46931 search results - page 9337 / 9387
» Networking the networks
Sort
View
AND
2009
15 years 1 months ago
Discovering voter preferences in blogs using mixtures of topic models
In this paper we propose a new approach to capture the inclination towards a certain election candidate from the contents of blogs and to explain why that inclination may be so. T...
Pradipto Das, Rohini K. Srihari, Smruthi Mukund
CICLING
2009
Springer
15 years 1 months ago
NLP for Shallow Question Answering of Legal Documents Using Graphs
Abstract. Previous work has shown that modeling relationships between articles of a regulation as vertices of a graph network works twice as better than traditional information ret...
Alfredo Monroy, Hiram Calvo, Alexander F. Gelbukh
EUSFLAT
2009
169views Fuzzy Logic» more  EUSFLAT 2009»
15 years 1 months ago
Decentralized Adaptive Fuzzy-Neural Control of an Anaerobic Digestion Bioprocess Plant
The paper proposed to use recurrent Fuzzy-Neural Multi-Model (FNMM) identifier for decentralized identification of a distributed parameter anaerobic wastewater treatment digestion ...
Ieroham S. Baruch, Rosalba Galvan-Guerra
FAST
2009
15 years 1 months ago
HYDRAstor: A Scalable Secondary Storage
HYDRAstor is a scalable, secondary storage solution aimed at the enterprise market. The system consists of a back-end architectured as a grid of storage nodes built around a distr...
Cezary Dubnicki, Leszek Gryz, Lukasz Heldt, Michal...
GI
2009
Springer
15 years 1 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
« Prev « First page 9337 / 9387 Last » Next »