Sciweavers

872 search results - page 87 / 175
» Sketch-based change detection: methods, evaluation, and appl...
Sort
View
RAID
2010
Springer
13 years 6 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
14 years 8 months ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...
WWW
2002
ACM
14 years 8 months ago
A machine learning based approach for table detection on the web
Table is a commonly used presentation scheme, especially for describing relational information. However, table understanding remains an open problem. In this paper, we consider th...
Yalin Wang, Jianying Hu
SLP
1993
110views more  SLP 1993»
13 years 9 months ago
Logic Program Specialisation With Deletion of Useless Clauses
In this paper we describe a method of programspecialisation and give an extended example of its application to specialisation of a refutation proof procedure for rst order logic. ...
D. Andre de Waal, John P. Gallagher
CLEF
2008
Springer
13 years 9 months ago
Overview of the Answer Validation Exercise 2008
The Answer Validation Exercise at the Cross Language Evaluation Forum (CLEF) is aimed at developing systems able to decide whether the answer of a Question Answering (QA) system i...
Álvaro Rodrigo, Anselmo Peñas, Felis...