Sciweavers

169 search results - page 11 / 34
» Sentiment Analysis using Support Vector Machines with Divers...
Sort
View
EUROSEC
2010
ACM
14 years 25 days ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
ESORICS
2011
Springer
12 years 7 months ago
Automated Information Flow Analysis of Virtualized Infrastructures
The use of server virtualization has been growing steadily, but many enterprises still are reluctant to migrate critical workloads to such infrastructures. One key inhibitor is the...
Sören Bleikertz, Thomas Groß, Matthias ...
ICML
2006
IEEE
14 years 8 months ago
Nonstationary kernel combination
The power and popularity of kernel methods stem in part from their ability to handle diverse forms of structured inputs, including vectors, graphs and strings. Recently, several m...
Darrin P. Lewis, Tony Jebara, William Stafford Nob...
URBAN
2011
185views more  URBAN 2011»
13 years 2 months ago
Supporting geographically-aware web document foraging and sensemaking
This paper reports on the development and application of strategies and tools for geographic information seeking and knowledge building that leverages unstructured text resources ...
Brian M. Tomaszewski, Justine Blanford, Kevin Ross...
IAAI
1993
13 years 8 months ago
COMPAQ QuickSource: Providing the Consumer with the Power of Artificial Intelligence
This paper describes COMPAQ QuickSource, an electronic problem-solving and information system for Compaq’s line of networked printers. A major goal in designing this system was ...
Trung Nguyen, Mary Czerwinski, Dan Lee