Sciweavers

1933 search results - page 254 / 387
» Query Containment Using Views
Sort
View
CCS
2003
ACM
15 years 8 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
CICLING
2010
Springer
15 years 6 months ago
Selecting the N-Top Retrieval Result Lists for an Effective Data Fusion
Although the application of data fusion in information retrieval has yielded good results in the majority of the cases, it has been noticed that its achievement is dependent on the...
Antonio Juárez-González, Manuel Mont...
AIPRF
2008
15 years 4 months ago
Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data
Unsolicited commercial or bulk emails or emails containing viruses pose a great threat to the utility of email communications. A recent solution for filtering is reputation systems...
Yuchun Tang, Sven Krasser, Dmitri Alperovitch, Pau...
TREC
2001
15 years 4 months ago
PiQASso: Pisa Question Answering System
PiQASso is a Question Answering system based on a combination of modern IR techniques and a series of semantic filters for selecting paragraphs containing a justifiable answer. Se...
Giuseppe Attardi, Antonio Cisternino, Francesco Fo...
SPIESR
1996
122views Database» more  SPIESR 1996»
15 years 4 months ago
Retrieval by Content in Symbolic-Image Databases
Two approaches for integrating images into the framework of a database management system are presented. The classi cation approach preprocesses all images and attaches a semantic ...
Aya Soffer, Hanan Samet