Sciweavers

3600 search results - page 608 / 720
» Conversational intelligence analysis
Sort
View
WWW
2010
ACM
15 years 11 months ago
What is disputed on the web?
We present a method for automatically acquiring of a corpus of disputed claims from the web. We consider a factual claim to be disputed if a page on the web suggests both that the...
Rob Ennals, Dan Byler, John Mark Agosta, Barbara R...
HICSS
2009
IEEE
134views Biometrics» more  HICSS 2009»
15 years 11 months ago
Exploring Two Enterprise Semantic Integration Systems
An Enterprise Semantic Integration System (ESIS) provides cross-domain and cross-department insights by normalizing and merging structured, semistructured, and unstructured data s...
Mark Ginsburg, Alex Kass, Peter Z. Yeh
GIS
2009
ACM
15 years 11 months ago
A salience-based approach for the modeling of landscape descriptions
While conventional GIS maps have long been a privileged way for the integration and diffusion of geographical information, novel forms of representation and description of urban ...
Jean-Marie Le Yaouanc, Eric Saux, Christophe Clara...
IEEEIAS
2009
IEEE
15 years 11 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
TPHOL
2009
IEEE
15 years 11 months ago
Formalising Observer Theory for Environment-Sensitive Bisimulation
Abstract. We consider a formalisation of a notion of observer (or intruder) theories, commonly used in symbolic analysis of security protocols. An observer theory describes the kno...
Jeremy E. Dawson, Alwen Tiu