Sciweavers

655 search results - page 55 / 131
» Using the Relational Model to Capture Topological Informatio...
Sort
View
IJSN
2007
73views more  IJSN 2007»
13 years 9 months ago
Optimal worm-scanning method using vulnerable-host distributions
: Most Internet worms use random scanning. The distribution of vulnerable hosts on the Internet, however, is highly non-uniform over the IP-address space. This implies that random ...
Zesheng Chen, Chuanyi Ji
BMVC
1998
13 years 10 months ago
Segmentation of Global Motion using Temporal Probabilistic Classification
The segmentation of pixels belonging to different moving elements within a cinematographic image sequence underpins a range of post-production special effects. In this work, the s...
P. R. Giaccone, Graeme A. Jones
ACL
2006
13 years 10 months ago
An Effective Two-Stage Model for Exploiting Non-Local Dependencies in Named Entity Recognition
This paper shows that a simple two-stage approach to handle non-local dependencies in Named Entity Recognition (NER) can outperform existing approaches that handle non-local depen...
Vijay Krishnan, Christopher D. Manning
SDM
2010
SIAM
183views Data Mining» more  SDM 2010»
13 years 10 months ago
GraSS: Graph Structure Summarization
Large graph databases are commonly collected and analyzed in numerous domains. For reasons related to either space efficiency or for privacy protection (e.g., in the case of socia...
Kristen LeFevre, Evimaria Terzi
BMCBI
2007
142views more  BMCBI 2007»
13 years 9 months ago
LinkHub: a Semantic Web system that facilitates cross-database queries and information retrieval in proteomics
nd: A key abstraction in representing proteomics knowledge is the notion of unique identifiers for individual entities (e.g. proteins) and the massive graph of relationships among...
Andrew K. Smith, Kei-Hoi Cheung, Kevin Y. Yip, Mar...