Sciweavers

2774 search results - page 19 / 555
» Exploiting Deep Structure
Sort
View
INFOCOM
2012
IEEE
13 years 2 months ago
FlowSifter: A counting automata approach to layer 7 field extraction for deep flow inspection
Abstract—In this paper, we introduce FlowSifter, a systematic framework for online application protocol field extraction. FlowSifter introduces a new grammar model Counting Regu...
Chad R. Meiners, Eric Norige, Alex X. Liu, Eric To...
LREC
2008
120views Education» more  LREC 2008»
15 years 1 months ago
Exploiting the Role of Position Feature in Chinese Relation Extraction
Relation extraction is the task of finding pre-defined semantic relations between two entities or entity mentions from text. Many methods, such as feature-based and kernel-based m...
Peng Zhang, Wenjie Li, Furu Wei, Qin Lu, Yuexian H...
PVLDB
2008
124views more  PVLDB 2008»
14 years 11 months ago
Google's Deep Web crawl
The Deep Web, i.e., content hidden behind HTML forms, has long been acknowledged as a significant gap in search engine coverage. Since it represents a large portion of the structu...
Jayant Madhavan, David Ko, Lucja Kot, Vignesh Gana...
EMNLP
2006
15 years 1 months ago
Exploiting Discourse Structure for Spoken Dialogue Performance Analysis
In this paper we study the utility of discourse structure for spoken dialogue performance modeling. We experiment with various ways of exploiting the discourse structure: in isola...
Mihai Rotaru, Diane J. Litman
DATE
2010
IEEE
190views Hardware» more  DATE 2010»
15 years 4 months ago
Ultra-high throughput string matching for Deep Packet Inspection
Deep Packet Inspection (DPI) involves searching a packet's header and payload against thousands of rules to detect possible attacks. The increase in Internet usage and growing...
Alan Kennedy, Xiaojun Wang, Zhen Liu, Bin Liu