Sciweavers

255 search results - page 46 / 51
» Place storming: performing new technologies in context
Sort
View
IMC
2009
ACM
14 years 3 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
KES
2007
Springer
14 years 3 months ago
Inductive Concept Retrieval and Query Answering with Semantic Knowledge Bases Through Kernel Methods
This work deals with the application of kernel methods to structured relational settings such as semantic knowledge bases expressed in Description Logics. Our method integrates a n...
Nicola Fanizzi, Claudia d'Amato
JUCS
2010
167views more  JUCS 2010»
13 years 7 months ago
Ontology based Approach in Knowledge Sharing Measurement
: For many years, physical asset indicators were the main evidence of an organization’s successful performance. However, the situation has changed following the revolution of inf...
Behrang Zadjabbari, Pornpit Wongthongtham, Farookh...
ICCAD
2002
IEEE
124views Hardware» more  ICCAD 2002»
14 years 5 months ago
Symbolic pointer analysis
— One of the bottlenecks in the recent movement of hardware synthesis from behavioral C programs is the difficulty in reasoning about runtime pointer values at compile time. The...
Jianwen Zhu
CIKM
2004
Springer
14 years 2 months ago
Node ranking in labeled directed graphs
Our work is motivated by the problem of ranking hyperlinked documents for a given query. Given an arbitrary directed graph with edge and node labels, we present a new flow-based ...
Krishna Prasad Chitrapura, Srinivas R. Kashyap