Sciweavers

34 search results - page 6 / 7
» Evaluation of Textual Knowledge Acquisition Tools: a Challen...
Sort
View
ISI
2007
Springer
13 years 6 months ago
Host Based Intrusion Detection using Machine Learning
—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions, such as anti-virus tools, rely heavily on prior explicit knowledge of specific instan...
Robert Moskovitch, Shay Pluderman, Ido Gus, Dima S...
IJCV
2000
121views more  IJCV 2000»
13 years 6 months ago
Regularized Bundle-Adjustment to Model Heads from Image Sequences without Calibration Data
We address the structure-from-motionproblem in the context of head modeling from video sequences for which calibration data is not available. This task is made challenging by the ...
Pascal Fua
LREC
2010
166views Education» more  LREC 2010»
13 years 7 months ago
A Derivational Rephrasing Experiment for Question Answering
In Knowledge Management, variations in information expressions have proven a real challenge. In particular, classical semantic relations (e.g. synonymy) do not connect words with ...
Bernard Jacquemin
ATAL
2011
Springer
12 years 6 months ago
GUARDS: game theoretic security allocation on a national scale
Building on research previously reported at AAMAS conferences, this paper describes an innovative application of a novel gametheoretic approach for a national scale security deplo...
James Pita, Milind Tambe, Christopher Kiekintveld,...
P2P
2007
IEEE
156views Communications» more  P2P 2007»
14 years 17 days ago
Completeness Estimation of Range Queries in Structured Overlays
Range queries are a very powerful tool in a wide range of data management systems and are vital to a multitude of applications. The hierarchy of structured overlay systems can be ...
Marcel Karnstedt, Kai-Uwe Sattler, Roman Schmidt