Sciweavers

7351 search results - page 1320 / 1471
» Machine Learning
Sort
View
AAAI
2008
15 years 13 days ago
Proactive Intrusion Detection
Machine learning systems are deployed in many adversarial conditions like intrusion detection, where a classifier has to decide whether a sequence of actions come from a legitimat...
Benjamin Liebald, Dan Roth, Neelay Shah, Vivek Sri...
AAAI
2007
15 years 13 days ago
A Text-to-Picture Synthesis System for Augmenting Communication
We present a novel Text-to-Picture system that synthesizes a picture from general, unrestricted natural language text. The process is analogous to Text-to-Speech synthesis, but wi...
Xiaojin Zhu, Andrew B. Goldberg, Mohamed Eldawy, C...
100
Voted
AAAI
2007
15 years 13 days ago
Template-Independent News Extraction Based on Visual Consistency
Wrapper is a traditional method to extract useful information from Web pages. Most previous works rely on the similarity between HTML tag trees and induced template-dependent wrap...
Shuyi Zheng, Ruihua Song, Ji-Rong Wen
FLAIRS
2008
15 years 13 days ago
Analyzing Dialog Coherence Using Transition Patterns in Lexical and Semantic Features
In this paper, we present methods to analyze dialog coherence that help us to automatically distinguish between coherent and incoherent conversations. We build a machine learning ...
Amruta Purandare, Diane J. Litman
FLAIRS
2008
15 years 13 days ago
Unsupervised Approach for Selecting Sentences in Query-based Summarization
When a user is served with a ranked list of relevant documents by the standard document search engines, his search task is usually not over. He has to go through the entire docume...
Yllias Chali, Shafiq R. Joty
« Prev « First page 1320 / 1471 Last » Next »