Sciweavers

1581 search results - page 164 / 317
» Competitive intelligence process and tools for intelligence ...
Sort
View
131
Voted
ISI
2005
Springer
15 years 9 months ago
Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content
Experiments were conducted to test several hypotheses on methods for improving document classification for the malicious insider threat problem within the Intelligence Community. ...
Ozgur Yilmazel, Svetlana Symonenko, Niranjan Balas...
LPAR
2007
Springer
15 years 9 months ago
Operational and Epistemic Approaches to Protocol Analysis: Bridging the Gap
Operational models of (security) protocols, on one hand, are readable and conveniently match their implementation (at a certain abstraction level). Epistemic models, on the other h...
Francien Dechesne, Mohammad Reza Mousavi, Simona O...
112
Voted
EWCBR
2004
Springer
15 years 9 months ago
An Analysis of Case-Base Editing in a Spam Filtering System
Because of the volume of spam email and its evolving nature, any deployed Machine Learning-based spam filtering system will need to have procedures for case-base maintenance. Key t...
Sarah Jane Delany, Padraig Cunningham
136
Voted
ICTAI
2009
IEEE
15 years 10 months ago
Preventing Unwanted Social Inferences with Classification Tree Analysis
A serious threat to user privacy in new mobile and web2.0 applications stems from ‘social inferences’. These unwanted inferences are related to the users’ identity, current ...
Sara Motahari, Sotirios G. Ziavras, Quentin Jones
KI
2009
Springer
15 years 10 months ago
SceneMaker: Automatic Visualisation of Screenplays
Abstract. Our proposed software system, SceneMaker, aims to facilitate the production of plays, films or animations by automatically interpreting natural language film scripts an...
Eva Hanser, Paul McKevitt, Tom Lunney, Joan Condel...