Sciweavers

36 search results - page 4 / 8
» The Effect of Binary Matching Rules in Negative Selection
Sort
View
ACSAC
2002
IEEE
14 years 12 days ago
Evaluating the Impact of Automated Intrusion Response Mechanisms
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detect intrusions with a variety of methods. Unfortunately, system administrators ne...
Thomas Toth, Christopher Krügel
ACCV
2006
Springer
14 years 1 months ago
Occlusion Invariant Face Recognition Using Selective LNMF Basis Images
In this paper, we propose a novel occlusion invariant face recognition algorithm based on Selective Local Nonnegative Matrix Factorization (S-LNMF) technique. The proposed algorith...
Hyun Jun Oh, Kyoung Mu Lee, Sang Uk Lee, Chung-Hyu...
EDBT
2009
ACM
96views Database» more  EDBT 2009»
14 years 2 months ago
Top-k dominant web services under multi-criteria matching
As we move from a Web of data to a Web of services, enhancing the capabilities of the current Web search engines with effective and efficient techniques for Web services retrieva...
Dimitrios Skoutas, Dimitris Sacharidis, Alkis Simi...
TREC
2001
13 years 8 months ago
SiteQ: Engineering High Performance QA System Using Lexico-Semantic Pattern Matching and Shallow NLP
s In TREC-10, we participated in the web track (only ad-hoc task) and the QA track (only main task). In the QA track, our QA system (SiteQ) has general architecture with three proc...
Gary Geunbae Lee, Jungyun Seo, Seungwoo Lee, Hanmi...
DAGSTUHL
2004
13 years 8 months ago
Application of Graph Transformation for Automating Web Service Discovery
The paper represents current achievements of an ongoing research that aims to develop a formal approach supporting an automatic selection of a Web service sought by a requestor. Th...
Reiko Heckel, Alexey Cherchago