Sciweavers

567 search results - page 48 / 114
» Exact train pathing
Sort
View
CSFW
2007
IEEE
15 years 6 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
COMPGEOM
2005
ACM
15 years 1 months ago
The Visibility-Voronoi Complex and Its Applications
We introduce a new type of diagram called the VV(c)-diagram (the visibility–Voronoi diagram for clearance c), which is a hybrid between the visibility graph and the Voronoi diag...
Ron Wein, Jur P. van den Berg, Dan Halperin
EMNLP
2007
15 years 1 months ago
Syntactic Re-Alignment Models for Machine Translation
We present a method for improving word alignment for statistical syntax-based machine translation that employs a syntactically informed alignment model closer to the translation m...
Jonathan May, Kevin Knight
ESWA
2008
102views more  ESWA 2008»
14 years 12 months ago
Hierarchical classifier with overlapping class groups
In this paper a novel complex classifier architecture is proposed. The architecture has a hierarchical tree-like structure with simple artificial neural networks (ANNs) at each no...
Igor T. Podolak
PAKDD
2005
ACM
128views Data Mining» more  PAKDD 2005»
15 years 5 months ago
A Framework for Incorporating Class Priors into Discriminative Classification
Abstract. Discriminative and generative methods provide two distinct approaches to machine learning classification. One advantage of generative approaches is that they naturally mo...
Rong Jin, Yi Liu