Sciweavers

1134 search results - page 210 / 227
» Analyzing Mapping Extraction Approaches
Sort
View
ACSAC
2003
IEEE
15 years 3 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...
NIPS
2007
15 years 1 months ago
Mining Internet-Scale Software Repositories
Large repositories of source code create new challenges and opportunities for statistical machine learning. Here we first develop Sourcerer, an infrastructure for the automated c...
Erik Linstead, Paul Rigor, Sushil Krishna Bajracha...
RIAO
2007
15 years 1 months ago
Selecting Automatically the Best Query Translations
In order to search corpora written in two or more languages, the simplest and most efficient approach is to translate the query submitted into the required language(s). To achieve...
Pierre-Yves Berger, Jacques Savoy
CLEF
2010
Springer
14 years 12 months ago
Overview of ResPubliQA 2010: Question Answering Evaluation over European Legislation
This paper describes the second round of ResPubliQA, a Question Answering (QA) evaluation task over European legislation, a LAB of CLEF 2010. Two tasks have been proposed this year...
Anselmo Peñas, Pamela Forner, Álvaro...
118
Voted
SIGIR
2008
ACM
14 years 11 months ago
SpotSigs: robust and efficient near duplicate detection in large web collections
Motivated by our work with political scientists who need to manually analyze large Web archives of news sites, we present SpotSigs, a new algorithm for extracting and matching sig...
Martin Theobald, Jonathan Siddharth, Andreas Paepc...