Sciweavers

756 search results - page 19 / 152
» The role data model revisited
Sort
View
ISSADS
2005
Springer
14 years 26 days ago
On the Role of Information Compaction to Intrusion Detection
An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
Fernando Godínez, Dieter Hutter, Raul Monro...
ACL
2011
12 years 11 months ago
Peeling Back the Layers: Detecting Event Role Fillers in Secondary Contexts
The goal of our research is to improve event extraction by learning to identify secondary role filler contexts in the absence of event keywords. We propose a multilayered event e...
Ruihong Huang, Ellen Riloff
EMNLP
2004
13 years 8 months ago
The Influence of Argument Structure on Semantic Role Assignment
We present a data and error analysis for semantic role labelling. In a first experiment, we build a generic statistical model for semantic role assignment in the FrameNet paradigm...
Sebastian Padó, Gemma Boleda
ICMCS
2007
IEEE
96views Multimedia» more  ICMCS 2007»
14 years 1 months ago
Role Recognition in Broadcast News using Bernoulli Distributions
This work presents an approach for the recognition of the roles played by speakers participating in radio broadcast news (e.g. anchorman or guest). The approach includes two main ...
Alessandro Vinciarelli
SACMAT
2003
ACM
14 years 19 days ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...