Sciweavers

169 search results - page 11 / 34
» Sentiment Analysis using Support Vector Machines with Divers...
Sort
View
EUROSEC
2010
ACM
15 years 8 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
ESORICS
2011
Springer
14 years 2 months ago
Automated Information Flow Analysis of Virtualized Infrastructures
The use of server virtualization has been growing steadily, but many enterprises still are reluctant to migrate critical workloads to such infrastructures. One key inhibitor is the...
Sören Bleikertz, Thomas Groß, Matthias ...
ICML
2006
IEEE
16 years 4 months ago
Nonstationary kernel combination
The power and popularity of kernel methods stem in part from their ability to handle diverse forms of structured inputs, including vectors, graphs and strings. Recently, several m...
Darrin P. Lewis, Tony Jebara, William Stafford Nob...
137
Voted
URBAN
2011
185views more  URBAN 2011»
14 years 10 months ago
Supporting geographically-aware web document foraging and sensemaking
This paper reports on the development and application of strategies and tools for geographic information seeking and knowledge building that leverages unstructured text resources ...
Brian M. Tomaszewski, Justine Blanford, Kevin Ross...
IAAI
1993
15 years 4 months ago
COMPAQ QuickSource: Providing the Consumer with the Power of Artificial Intelligence
This paper describes COMPAQ QuickSource, an electronic problem-solving and information system for Compaq’s line of networked printers. A major goal in designing this system was ...
Trung Nguyen, Mary Czerwinski, Dan Lee