Sciweavers

2631 search results - page 370 / 527
» SVM Based Learning System for Information Extraction
Sort
View
142
Voted
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 11 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
KDD
2002
ACM
148views Data Mining» more  KDD 2002»
16 years 5 months ago
Tumor cell identification using features rules
Advances in imaging techniques have led to large repositories of images. There is an increasing demand for automated systems that can analyze complex medical images and extract me...
Bin Fang, Wynne Hsu, Mong-Li Lee
152
Voted
KDD
2010
ACM
277views Data Mining» more  KDD 2010»
15 years 8 months ago
Growing a tree in the forest: constructing folksonomies by integrating structured metadata
Many social Web sites allow users to annotate the content with descriptive metadata, such as tags, and more recently to organize content hierarchically. These types of structured ...
Anon Plangprasopchok, Kristina Lerman, Lise Getoor
ATAL
2008
Springer
15 years 6 months ago
A statistical relational model for trust learning
We address the learning of trust based on past observations and context information. We argue that from the truster's point of view trust is best expressed as one of several ...
Achim Rettinger, Matthias Nickles, Volker Tresp
JAIR
2008
118views more  JAIR 2008»
15 years 4 months ago
On the Use of Automatically Acquired Examples for All-Nouns Word Sense Disambiguation
This article focuses on Word Sense Disambiguation (WSD), which is a Natural Language Processing task that is thought to be important for many Language Technology applications, suc...
David Martínez, Oier Lopez de Lacalle, Enek...