Sciweavers

362 search results - page 33 / 73
» System Demonstration of On-Demand Information Extraction
Sort
View
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 3 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
EDBT
2002
ACM
112views Database» more  EDBT 2002»
14 years 8 months ago
Querying with Intrinsic Preferences
The handling of user preferences is becoming an increasingly important issue in present-day information systems. Among others, preferences are used for information filtering and ex...
Jan Chomicki
IDEAL
2007
Springer
14 years 2 months ago
Partitioning-Clustering Techniques Applied to the Electricity Price Time Series
Clustering is used to generate groupings of data from a large dataset, with the intention of representing the behavior of a system as accurately as possible. In this sense, cluster...
Francisco Martínez-Álvarez, Alicia T...
SPIRE
2007
Springer
14 years 2 months ago
Highly Frequent Terms and Sentence Retrieval
In this paper we propose a novel sentence retrieval method based on extracting highly frequent terms from top retrieved documents. We compare it against state of the art sentence r...
David E. Losada, Ronald T. Fernández
MKM
2005
Springer
14 years 2 months ago
Processing Textbook-Style Matrices
In mathematical textbooks matrices are often represented as objects of indefinite size containing abbreviations. To make the knowledge implicitly given in these representations av...
Alan P. Sexton, Volker Sorge