Sciweavers

1999 search results - page 283 / 400
» Finding Reductions Automatically
Sort
View
106
Voted
CCS
2006
ACM
15 years 5 months ago
Evading network anomaly detection systems: formal reasoning and practical techniques
Attackers often try to evade an intrusion detection system (IDS) when launching their attacks. There have been several published studies in evasion attacks, some with available to...
Prahlad Fogla, Wenke Lee
CIKM
2008
Springer
15 years 3 months ago
Academic conference homepage understanding using constrained hierarchical conditional random fields
We address the problem of academic conference homepage understanding for the Semantic Web. This problem consists of three labeling tasks - labeling conference function pages, func...
Xin Xin, Juanzi Li, Jie Tang, Qiong Luo
ICWS
2004
IEEE
15 years 2 months ago
External Matching in UDDI
As the set of available Web Services expands, it becomes increasingly important to have automated tools to help identify services that match a requester's requirements. Findi...
John Colgrave, Rama Akkiraju, Richard Goodwin
TKDE
2008
125views more  TKDE 2008»
15 years 1 months ago
Discovering and Explaining Abnormal Nodes in Semantic Graphs
An important problem in the area of homeland security is to identify abnormal or suspicious entities in large datasets. Although there are methods from data mining and social netwo...
Shou-de Lin, Hans Chalupsky
PVLDB
2008
130views more  PVLDB 2008»
15 years 1 months ago
Analyzing and revising data integration schemas to improve their matchability
Data integration systems often provide a uniform query interface, called a mediated schema, to a multitude of data sources. To answer user queries, such systems employ a set of se...
Xiaoyong Chai, Mayssam Sayyadian, AnHai Doan, Arno...