Sciweavers

813 search results - page 138 / 163
» Learning semantic models from event logs
Sort
View
125
Voted
JAIR
2010
181views more  JAIR 2010»
14 years 6 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
UIST
2006
ACM
15 years 5 months ago
Summarizing personal web browsing sessions
We describe a system, implemented as a browser extension, that enables users to quickly and easily collect, view, and share personal Web content. Our system employs a novel intera...
Mira Dontcheva, Steven M. Drucker, Geraldine Wade,...
CVPR
2010
IEEE
15 years 7 months ago
Automatic Discovery of Meaningful Object Parts with Latent CRFs
Object recognition is challenging due to high intra-class variability caused, e.g., by articulation, viewpoint changes, and partial occlusion. Successful methods need to strike a...
Paul Schnitzspan, Stefan Roth, Bernt Schiele
PKDD
2009
Springer
136views Data Mining» more  PKDD 2009»
15 years 5 months ago
Integrating Logical Reasoning and Probabilistic Chain Graphs
Probabilistic logics have attracted a great deal of attention during the past few years. While logical languages have taken a central position in research on knowledge representati...
Arjen Hommersom, Nivea de Carvalho Ferreira, Peter...
WWW
2009
ACM
15 years 11 months ago
Discovering users' specific geo intention in web search
Discovering users' specific and implicit geographic intention in web search can greatly help satisfy users' information needs. We build a geo intent analysis system that...
Xing Yi, Hema Raghavan, Chris Leggetter