Sciweavers

1825 search results - page 337 / 365
» From exploratory search to web search and back
Sort
View
IEEECIT
2010
IEEE
14 years 9 months ago
Learning Autonomic Security Reconfiguration Policies
Abstract--We explore the idea of applying machine learning techniques to automatically infer risk-adaptive policies to reconfigure a network security architecture when the context ...
Juan E. Tapiador, John A. Clark
SIGSOFT
2010
ACM
14 years 9 months ago
Realizability analysis for message-based interactions using shared-state projections
The global interaction behavior in message-based systems can be specified as a finite-state machine defining acceptable sequences of messages exchanged by a group of peers. Realiz...
Sylvain Hallé, Tevfik Bultan
EMNLP
2009
14 years 9 months ago
Empirical Exploitation of Click Data for Task Specific Ranking
There have been increasing needs for task specific rankings in web search such as rankings for specific query segments like long queries, time-sensitive queries, navigational quer...
Anlei Dong, Yi Chang, Shihao Ji, Ciya Liao, Xin Li...
WWW
2011
ACM
14 years 6 months ago
EntityTagger: automatically tagging entities with descriptive phrases
We consider the problem of entity tagging: given one or more named entities from a specific domain, the goal is to automatically associate descriptive phrases, referred to as eta...
Kaushik Chakrabarti, Surajit Chaudhuri, Tao Cheng,...
JDIM
2010
156views more  JDIM 2010»
14 years 6 months ago
Rule based Autonomous Citation Mining with TIERL
: Citations management is an important task in managing digital libraries. Citations provide valuable information e.g., used in evaluating an author's influences or scholarly ...
Muhammad Tanvir Afzal, Hermann A. Maurer, Wolf-Til...