Sciweavers

918 search results - page 136 / 184
» Using Predicate-Argument Structures for Information Extracti...
Sort
View
ADC
2009
Springer
175views Database» more  ADC 2009»
15 years 4 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang
RSP
2007
IEEE
141views Control Systems» more  RSP 2007»
15 years 4 months ago
Rapid Prototyping of Intrusion Detection Systems
Designing security softwares that evolve as quickly as threats is a truthful challenge. In addition, current software becomes increasingly more complex and difficult to handle ev...
Fabrice Kordon, Jean-Baptiste Voron
ISNN
2007
Springer
15 years 3 months ago
Neural-Based Separating Method for Nonlinear Mixtures
A neural-based method for source separation in nonlinear mixture is proposed in this paper. A cost function, which consists of the mutual information and partial moments of the out...
Ying Tan
SOFTVIS
2005
ACM
15 years 3 months ago
Visual data mining in software archives
Software archives contain historical information about the development process of a software system. Using data mining techniques rules can be extracted from these archives. In th...
Michael Burch, Stephan Diehl, Peter Weißgerb...
ISMIR
2005
Springer
124views Music» more  ISMIR 2005»
15 years 3 months ago
Symbolic Representation of Musical Chords: A Proposed Syntax for Text Annotations
In this paper we propose a text represention for musical chord symbols that is simple and intuitive for musically trained individuals to write and understand, yet highly structure...
Christopher Harte, Mark B. Sandler, Samer A. Abdal...