Sciweavers

1436 search results - page 174 / 288
» Using Machine Learning Techniques to Interpret WH-questions
Sort
View
101
Voted
COMPSAC
2005
IEEE
15 years 7 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine
138
Voted
ICAC
2007
IEEE
15 years 8 months ago
Adaptive Learning of Metric Correlations for Temperature-Aware Database Provisioning
This paper introduces a transparent self-configuring architecture for automatic scaling with temperature awareness in the database tier of a dynamic content web server. We use a ...
Saeed Ghanbari, Gokul Soundararajan, Jin Chen, Cri...
RIAO
2000
15 years 2 months ago
Learning for Sequence Extraction Tasks
We consider the application of machine learning techniques for sequence modeling to Information Retrieval (IR) and surface Information Extraction (IE) tasks. We introduce a generi...
Massih-Reza Amini, Hugo Zaragoza, Patrick Gallinar...
AAAI
2012
13 years 4 months ago
Ontological Smoothing for Relation Extraction with Minimal Supervision
Relation extraction, the process of converting natural language text into structured knowledge, is increasingly important. Most successful techniques use supervised machine learni...
Congle Zhang, Raphael Hoffmann, Daniel S. Weld
IROS
2008
IEEE
191views Robotics» more  IROS 2008»
15 years 8 months ago
Local Gaussian process regression for real-time model-based robot control
— High performance and compliant robot control requires accurate dynamics models which cannot be obtained analytically for sufficiently complex robot systems. In such cases, mac...
Duy Nguyen-Tuong, Jan Peters