Sciweavers

367 search results - page 69 / 74
» Unsupervised Information Extraction with Distributional Prio...
Sort
View
CCS
2004
ACM
15 years 3 months ago
KNOW Why your access was denied: regulating feedback for usable security
We examine the problem of providing useful feedback about access control decisions to users while controlling the disclosure of the system’s security policies. Relevant feedback...
Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell
FSKD
2006
Springer
298views Fuzzy Logic» more  FSKD 2006»
15 years 1 months ago
Risk Assessment of E-Commerce Projects Using Evidential Reasoning
The purpose of this study is to develop a decision making system to evaluate the risks in E-Commerce (EC) projects. Competitive software businesses have the critical task of assess...
Rashid Hafeez Khokhar, David A. Bell, Jiwen Guan, ...
CIKM
2008
Springer
14 years 11 months ago
Learning a two-stage SVM/CRF sequence classifier
Learning a sequence classifier means learning to predict a sequence of output tags based on a set of input data items. For example, recognizing that a handwritten word is "ca...
Guilherme Hoefel, Charles Elkan
WWW
2005
ACM
15 years 10 months ago
Gimme' the context: context-driven automatic semantic annotation with C-PANKOW
Without the proliferation of formal semantic annotations, the Semantic Web is certainly doomed to failure. In earlier work we presented a new paradigm to avoid this: the 'Sel...
Günter Ladwig, Philipp Cimiano, Steffen Staab
102
Voted
KDD
2005
ACM
218views Data Mining» more  KDD 2005»
15 years 10 months ago
A maximum entropy web recommendation system: combining collaborative and content features
Web users display their preferences implicitly by navigating through a sequence of pages or by providing numeric ratings to some items. Web usage mining techniques are used to ext...
Xin Jin, Yanzan Zhou, Bamshad Mobasher