Sciweavers

46931 search results - page 9337 / 9387
» Networking the networks
Sort
View
103
Voted
AND
2009
14 years 8 months ago
Discovering voter preferences in blogs using mixtures of topic models
In this paper we propose a new approach to capture the inclination towards a certain election candidate from the contents of blogs and to explain why that inclination may be so. T...
Pradipto Das, Rohini K. Srihari, Smruthi Mukund
96
Voted
CICLING
2009
Springer
14 years 8 months ago
NLP for Shallow Question Answering of Legal Documents Using Graphs
Abstract. Previous work has shown that modeling relationships between articles of a regulation as vertices of a graph network works twice as better than traditional information ret...
Alfredo Monroy, Hiram Calvo, Alexander F. Gelbukh
EUSFLAT
2009
169views Fuzzy Logic» more  EUSFLAT 2009»
14 years 8 months ago
Decentralized Adaptive Fuzzy-Neural Control of an Anaerobic Digestion Bioprocess Plant
The paper proposed to use recurrent Fuzzy-Neural Multi-Model (FNMM) identifier for decentralized identification of a distributed parameter anaerobic wastewater treatment digestion ...
Ieroham S. Baruch, Rosalba Galvan-Guerra
FAST
2009
14 years 8 months ago
HYDRAstor: A Scalable Secondary Storage
HYDRAstor is a scalable, secondary storage solution aimed at the enterprise market. The system consists of a back-end architectured as a grid of storage nodes built around a distr...
Cezary Dubnicki, Leszek Gryz, Lukasz Heldt, Michal...
GI
2009
Springer
14 years 8 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
« Prev « First page 9337 / 9387 Last » Next »