Sciweavers

1113 search results - page 157 / 223
» Automated Approaches for Classifying Structures
Sort
View
159
Voted
KDD
2012
ACM
244views Data Mining» more  KDD 2012»
13 years 5 months ago
Open domain event extraction from twitter
Tweets are the most up-to-date and inclusive stream of information and commentary on current events, but they are also fragmented and noisy, motivating the need for systems that c...
Alan Ritter, Mausam, Oren Etzioni, Sam Clark
109
Voted
CADE
2008
Springer
16 years 3 months ago
Proving Group Protocols Secure Against Eavesdroppers
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate ...
Steve Kremer, Antoine Mercier 0002, Ralf Treinen
AIME
2009
Springer
15 years 10 months ago
Segmentation of Text and Non-text in On-Line Handwritten Patient Record Based on Spatio-Temporal Analysis
Note taking is a common way for physicians to collect information from their patients in medical inquiries and diagnoses. Many times, when describing the pathology in medical recor...
Rattapoom Waranusast, Peter Haddawy, Matthew N. Da...
141
Voted
RAID
2009
Springer
15 years 10 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...
130
Voted
EWCBR
2004
Springer
15 years 8 months ago
Investigating Graphs in Textual Case-Based Reasoning
Textual case-based reasoning (TCBR) provides the ability to reason with domain-specific knowledge when experiences exist in text. Ideally, we would like to find an inexpensive way ...
Colleen Cunningham, Rosina Weber, Jason M. Proctor...