Sciweavers

909 search results - page 166 / 182
» Human Discovery and Machine Learning
Sort
View
94
Voted
SGAI
2004
Springer
15 years 3 months ago
Neighbourhood Exploitation in Hypertext Categorization
As the web expands exponentially, the need to put some order to its content becomes apparent. Hypertext categorization, that is the automatic classification of web documents into ...
Houda Benbrahim, Max Bramer
HAIS
2010
Springer
15 years 2 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
ICSE
2010
IEEE-ACM
15 years 2 months ago
Summarizing software artifacts: a case study of bug reports
Many software artifacts are created, maintained and evolved as part of a software development project. As software developers work on a project, they interact with existing projec...
Sarah Rastkar, Gail C. Murphy, Gabriel Murray
ICAIL
2009
ACM
15 years 2 months ago
Segmentation of legal documents
An overwhelming number of legal documents is available in digital form. However, most of the texts are usually only provided in a semi-structured form, i.e. the documents are stru...
Eneldo Loza Mencía
KDD
2001
ACM
226views Data Mining» more  KDD 2001»
15 years 2 months ago
Image Mining: Issues, Frameworks and Techniques
Advances in image acquisition and storage technology have led to tremendous growth in significantly large and detailed image databases. These images, if analyzed, can reveal usefu...
Ji Zhang, Wynne Hsu, Mong-Li Lee