Sciweavers

394 search results - page 61 / 79
» Learning to recommend questions based on user ratings
Sort
View
NIPS
1997
14 years 11 months ago
Intrusion Detection with Neural Networks
With the rapid expansion of computer networks during the past few years, security has become a crucial issue for modern computer systems. A good way to detect illegitimate use is ...
Jake Ryan, Meng-Jang Lin, Risto Miikkulainen
ICDE
2008
IEEE
146views Database» more  ICDE 2008»
15 years 11 months ago
Explaining and Reformulating Authority Flow Queries
Authority flow is an effective ranking mechanism for answering queries on a broad class of data. Systems have been developed to apply this principle on the Web (PageRank and topic ...
Ramakrishna Varadarajan, Vagelis Hristidis, Louiqa...
MOBIQUITOUS
2007
IEEE
15 years 4 months ago
TRULLO - local trust bootstrapping for ubiquitous devices
—Handheld devices have become sufficiently powerful that it is easy to create, disseminate, and access digital content (e.g., photos, videos) using them. The volume of such cont...
Daniele Quercia, Stephen Hailes, Licia Capra
FQAS
2004
Springer
135views Database» more  FQAS 2004»
15 years 1 months ago
Interactive Schema Integration with Sphinx
Abstract. The Internet has instigated a critical need for automated tools that facilitate integrating countless databases. Since non-technical end users are often the ultimate repo...
François Barbançon, Daniel P. Mirank...
JIIS
2007
133views more  JIIS 2007»
14 years 9 months ago
SPHINX: Schema integration by example
The Internet has instigated a critical need for automated tools that facilitate integrating countless databases. Since non-technical end users are often the ultimate repositories ...
François Barbançon, Daniel P. Mirank...