Sciweavers

23630 search results - page 169 / 4726
» Common Information Model
Sort
View
ISI
2006
Springer
15 years 4 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
ICPR
2004
IEEE
16 years 5 months ago
Image Analysis Through Local Information Measures
The properties of local image statistics are analyzed in a classic information theoretic setting. Local spatiochromatic image elements are projected into a space in which constitu...
Neil Bruce
150
Voted
REFSQ
2007
Springer
15 years 10 months ago
Information Flow Between Requirement Artifacts. Results of an Empirical Study
Abstract. Requirements engineering is still an area of software engineering in which theory and practice greatly differ. This work presents the results of an empirical study of ar...
Stefan Winkler
ANLP
2000
114views more  ANLP 2000»
15 years 5 months ago
Unsupervised Discovery of Scenario-Level Patterns for Information Extraction
Information Extraction (IE) systems are commonly based on pattern matching. Adapting an IE system to a new scenario entails the construction of a new pattern base--a timeconsuming...
Roman Yangarber, Ralph Grishman, Pasi Tapanainen
ACL
2009
15 years 2 months ago
The Contribution of Stylistic Information to Content-based Mobile Spam Filtering
Content-based approaches to detecting mobile spam to date have focused mainly on analyzing the topical aspect of a SMS message (what it is about) but not on the stylistic aspect (...
Dae-Neung Sohn, Jung-Tae Lee, Hae-Chang Rim