Sciweavers

327 search results - page 66 / 66
» How to Evaluate Social Intelligence Design
Sort
View
IMC
2009
ACM
15 years 6 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
SIGIR
2010
ACM
14 years 10 months ago
EUSUM: extracting easy-to-understand english summaries for non-native readers
In this paper we investigate a novel and important problem in multi-document summarization, i.e., how to extract an easy-tounderstand English summary for non-native readers. Exist...
Xiaojun Wan, Huiying Li, Jianguo Xiao