Sciweavers

3235 search results - page 413 / 647
» Partial Redundant Modeling
Sort
View
KDD
2009
ACM
190views Data Mining» more  KDD 2009»
16 years 4 months ago
Named entity mining from click-through data using weakly supervised latent dirichlet allocation
This paper addresses Named Entity Mining (NEM), in which we mine knowledge about named entities such as movies, games, and books from a huge amount of data. NEM is potentially use...
Gu Xu, Shuang-Hong Yang, Hang Li
ISPEC
2009
Springer
15 years 11 months ago
On the Correctness of an Approach against Side-Channel Attacks
Abstract. Side-channel attacks are a very powerful cryptanalytic technique. Li and Gu [ProvSec’07] proposed an approach against side-channel attacks, which states that a symmetri...
Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang
150
Voted
PKDD
2009
Springer
102views Data Mining» more  PKDD 2009»
15 years 10 months ago
Relevance Grounding for Planning in Relational Domains
Probabilistic relational models are an efficient way to learn and represent the dynamics in realistic environments consisting of many objects. Autonomous intelligent agents that gr...
Tobias Lang, Marc Toussaint
IPPS
2005
IEEE
15 years 10 months ago
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks
One of the most serious security threats in the Internet are Distributed Denial of Service ( DDoS) attacks, due to the significant service disruption they can create and the di...
Vasilios A. Siris, Ilias Stavrakis
ICRA
2003
IEEE
119views Robotics» more  ICRA 2003»
15 years 9 months ago
The FeTouch project
: Ultrasound technologies have been widely used in gynecology and obstetrics. Modern ultrasound systems allow the reconstruction of a 3D model of the subject being scanned. Even th...
B. la Torre, Domenico Prattichizzo, Federico Barba...