Sciweavers

158 search results - page 24 / 32
» Integrating Defeasible Argumentation and Machine Learning Te...
Sort
View
ICDIM
2010
IEEE
14 years 9 months ago
Detecting incompleteness in access control policies using data classification schemes
In a set of access control policies, incompleteness is the existence of situations for which no policy applies. Some of these situations can be exploited by attackers, to obtain un...
Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serg...
CIKM
2010
Springer
14 years 10 months ago
Clickthrough-based translation models for web search: from word models to phrase models
Web search is challenging partly due to the fact that search queries and Web documents use different language styles and vocabularies. This paper provides a quantitative analysis ...
Jianfeng Gao, Xiaodong He, Jian-Yun Nie
NIPS
2004
15 years 1 months ago
Maximum Margin Clustering
We propose a new method for clustering based on finding maximum margin hyperplanes through data. By reformulating the problem in terms of the implied equivalence relation matrix, ...
Linli Xu, James Neufeld, Bryce Larson, Dale Schuur...
IJNSEC
2007
119views more  IJNSEC 2007»
14 years 11 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
AO
2005
147views more  AO 2005»
14 years 11 months ago
Domain modelling and NLP: Formal ontologies? Lexica? Or a bit of both?
There are a number of genuinely open questions concerning the use of domain models in nlp. It would be great if contributors to Applied Ontology could help addressing them rather ...
Massimo Poesio