Sciweavers

1298 search results - page 107 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
122
Voted
IPPS
2005
IEEE
15 years 9 months ago
Security Enhancement in InfiniBand Architecture
The InfiniBandTM Architecture (IBA) is a new promising I/O communication standard positioned for building clusters and System Area Networks (SANs). However, the IBA specification ...
Manhee Lee, Eun Jung Kim, Mazin S. Yousif
142
Voted
WWW
2008
ACM
16 years 4 months ago
Exploring social annotations for information retrieval
Social annotation has gained increasing popularity in many Web-based applications, leading to an emerging research area in text analysis and information retrieval. This paper is c...
Ding Zhou, Jiang Bian, Shuyi Zheng, Hongyuan Zha, ...
137
Voted
ACL
2008
15 years 4 months ago
Word Clustering and Word Selection Based Feature Reduction for MaxEnt Based Hindi NER
Statistical machine learning methods are employed to train a Named Entity Recognizer from annotated data. Methods like Maximum Entropy and Conditional Random Fields make use of fe...
Sujan Kumar Saha, Pabitra Mitra, Sudeshna Sarkar
IV
2010
IEEE
193views Visualization» more  IV 2010»
15 years 1 months ago
Drawing Clustered Bipartite Graphs in Multi-circular Style
Abstract—Bipartite graphs are often used to illustrate relationships between two sets of data, such as web pages and visitors. At the same time, information is often organized hi...
Takao Ito, Kazuo Misue, Jiro Tanaka
114
Voted
ADC
2001
Springer
97views Database» more  ADC 2001»
15 years 8 months ago
View updates in a semantic data modelling paradigm
The Sketch Data Model (SkDM) is a new semantic modelling paradigm based on category theory (specifically on categorical universal algebra), which has been used successfully in se...
Michael Johnson, Robert D. Rosebrugh, Christopher ...