Sciweavers

1756 search results - page 267 / 352
» Mapping Small Worlds
Sort
View
ECAI
1990
Springer
15 years 8 months ago
The Semantics of MOLUSC
Much recent work in computational morphology has presupposed that morphological operations are de nable on strings of phonological or graphemic objects. By contrast, theoretical l...
Lynne J. Cahill, Gerald Gazdar
SIGIR
2010
ACM
15 years 8 months ago
Adaptive near-duplicate detection via similarity learning
In this paper, we present a novel near-duplicate document detection method that can easily be tuned for a particular domain. Our method represents each document as a real-valued s...
Hannaneh Hajishirzi, Wen-tau Yih, Aleksander Kolcz
ACSAC
2004
IEEE
15 years 8 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
140
Voted
APCHI
2004
IEEE
15 years 8 months ago
Chromotome: A 3D Interface for Exploring Colour Space
When continuous 3D shapes or enclosed structures, such as solid objects or skeletons, are mapped onto a 2D screen, simplifications such as hulls and wire frames are suitable visual...
Giovanni S. Moretti, Paul J. Lyons, Mark Wilson
BPM
2004
Springer
148views Business» more  BPM 2004»
15 years 8 months ago
Interactive Workflow Mining
Many information systems log event data about executed tasks. Workflow mining is concerned with the derivation of a graphical workflow model out of this data. Experience from appl...
Markus Hammori, Joachim Herbst, Niko Kleiner