Sciweavers

1863 search results - page 366 / 373
» Natural Language Analysis for Semantic Document Modeling
Sort
View
CCS
2003
ACM
15 years 4 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
VLC
2010
91views more  VLC 2010»
14 years 10 months ago
A model-based recognition engine for sketched diagrams
Many of today’s recognition approaches for hand-drawn sketches are feature-based, which is conceptually similar to the recognition of hand-written text. While very suitable for ...
Florian Brieler, Mark Minas
KCAP
2011
ACM
14 years 2 months ago
Let's agree to disagree: on the evaluation of vocabulary alignment
Gold standard mappings created by experts are at the core of alignment evaluation. At the same time, the process of manual evaluation is rarely discussed. While the practice of ha...
Anna Tordai, Jacco van Ossenbruggen, Guus Schreibe...
PLDI
2010
ACM
15 years 4 months ago
Smooth interpretation
We present smooth interpretation, a method to systematically approximate numerical imperative programs by smooth mathematical functions. This approximation facilitates the use of ...
Swarat Chaudhuri, Armando Solar-Lezama
AICT
2006
IEEE
163views Communications» more  AICT 2006»
15 years 5 months ago
A Methodology for Searching Reusable Business Processes
Web Services are becoming the prominent paradigm for distributed computing and electronic businesses. This makes natural the extension of the concepts at the base of the workflow ...
Francesco Calabrese, Giovanni Di Dio, Anna Rita Fa...