Sciweavers

263 search results - page 18 / 53
» Toward best-effort information extraction
Sort
View
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 10 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
WEBDB
2009
Springer
149views Database» more  WEBDB 2009»
14 years 4 months ago
Extracting Route Directions from Web Pages
Linguists and geographers are more and more interested in route direction documents because they contain interesting motion descriptions and language patterns. A large number of s...
Xiao Zhang, Prasenjit Mitra, Sen Xu, Anuj R. Jaisw...
IQIS
2007
ACM
13 years 11 months ago
Towards a Benchmark for ETL Workflows
Extraction–Transform–Load (ETL) processes comprise complex data workflows, which are responsible for the maintenance of a Data Warehouse. Their practical importance is denoted...
Panos Vassiliadis, Anastasios Karagiannis, Vasilik...
WCRE
2005
IEEE
14 years 3 months ago
Toward an Infrastructure to Support Interoperability in Reverse Engineering
In this paper we present an infrastructure that supports interoperability among various reverse engineering tools and applications. We include an Application Programmer’s Interf...
Nicholas A. Kraft, Brian A. Malloy, James F. Power
SIGIR
2003
ACM
14 years 3 months ago
A personalised information retrieval tool
Due to both the size and growth of the internet, new tools are needed to assist with the finding and extraction of very specific resources relevant to a user's task. Previous...
Innes Martin, Joemon M. Jose