Sciweavers

7378 search results - page 1330 / 1476
» Introduction to Machine Learning
Sort
View
HAIS
2010
Springer
15 years 2 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
ICSE
2010
IEEE-ACM
15 years 2 months ago
Summarizing software artifacts: a case study of bug reports
Many software artifacts are created, maintained and evolved as part of a software development project. As software developers work on a project, they interact with existing projec...
Sarah Rastkar, Gail C. Murphy, Gabriel Murray
NOSSDAV
2010
Springer
15 years 2 months ago
TSync: a new synchronization framework for multi-site 3D tele-immersion
Synchronization is a challenge in the multi-site 3D teleimmersion (3DTI) because it is complicated by the coexistence of highly correlated heterogenous streams from multiple sourc...
Zixia Huang, Wanmin Wu, Klara Nahrstedt, Md. Ahsan...
ICAIL
2009
ACM
15 years 2 months ago
Segmentation of legal documents
An overwhelming number of legal documents is available in digital form. However, most of the texts are usually only provided in a semi-structured form, i.e. the documents are stru...
Eneldo Loza Mencía
MLDM
2009
Springer
15 years 2 months ago
Assisting Data Mining through Automated Planning
The induction of knowledge from a data set relies in the execution of multiple data mining actions: to apply filters to clean and select the data, to train different algorithms (...
Fernando Fernández, Daniel Borrajo, Susana ...
« Prev « First page 1330 / 1476 Last » Next »