Sciweavers

6826 search results - page 1291 / 1366
» Business Process Intelligence
Sort
View
68
Voted
CIKM
2009
Springer
15 years 3 months ago
Answer typing for information retrieval
Answer typing is commonly thought of as finding appropriate responses to given questions. We extend the notion of answer typing to information retrieval to ensure results contain...
Christopher Pinchak, Davood Rafiei, Dekang Lin
87
Voted
FAST
2010
15 years 2 months ago
A Clean-Slate Look at Disk Scrubbing
A number of techniques have been proposed to reduce the risk of data loss in hard-drives, from redundant disks (e.g., RAID systems) to error coding within individual drives. Disk ...
Alina Oprea, Ari Juels
109
Voted
USS
2008
15 years 2 months ago
Securing Provenance
Provenance describes how an object came to be in its present state. Intelligence dossiers, medical records and corporate financial reports capture provenance information. Many of ...
Uri Braun, Avraham Shinnar, Margo I. Seltzer
106
Voted
USS
2008
15 years 2 months ago
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads
We present an automated, scalable, method for crafting dynamic responses to real-time network requests. Specifically, we provide a flexible technique based on natural language pro...
Sam Small, Joshua Mason, Fabian Monrose, Niels Pro...
91
Voted
CIKM
2008
Springer
15 years 2 months ago
Learning to link with wikipedia
This paper describes how to automatically cross-reference documents with Wikipedia: the largest knowledge base ever known. It explains how machine learning can be used to identify...
David N. Milne, Ian H. Witten
« Prev « First page 1291 / 1366 Last » Next »