Sciweavers

1586 search results - page 259 / 318
» Semantic Schema Matching
Sort
View
142
Voted
IR
2010
15 years 1 months ago
Learning to rank with (a lot of) word features
In this article we present Supervised Semantic Indexing (SSI) which defines a class of nonlinear (quadratic) models that are discriminatively trained to directly map from the word...
Bing Bai, Jason Weston, David Grangier, Ronan Coll...
127
Voted
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 8 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
229
Voted
POPL
2003
ACM
16 years 3 months ago
Pure patterns type systems
We introduce a new framework of algebraic pure type systems in which we consider rewrite rules as lambda terms with patterns and rewrite rule application as abstraction applicatio...
Gilles Barthe, Horatiu Cirstea, Claude Kirchner, L...
119
Voted
CCS
2003
ACM
15 years 7 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
144
Voted
IR
2006
15 years 2 months ago
A relatedness analysis of government regulations using domain knowledge and structural organization
The complexity and diversity of government regulations make understanding and retrieval of regulations a non-trivial task. One of the issues is the existence of multiple sources o...
Gloria T. Lau, Kincho H. Law, Gio Wiederhold