Sciweavers

1759 search results - page 129 / 352
» Using term informativeness for named entity detection
Sort
View
ISSA
2004
14 years 11 months ago
Categorizing Vulnerabilities Using Data Clustering Techniques
Vulnerability scanning is one of the proactive information security technologies in the Internet and network security domain. However, the current vulnerability scanner (VS) produ...
Yun (Lillian) Li
ICIP
2008
IEEE
15 years 4 months ago
Dynamic background modeling and subtraction using spatio-temporal local binary patterns
Traditional background modeling and subtraction methods have a strong assumption that the scenes are of static structures with limited perturbation. These methods will perform poo...
Shengping Zhang, Hongxun Yao, Shaohui Liu
WORM
2004
14 years 11 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong
WWW
2009
ACM
15 years 10 months ago
Rated aspect summarization of short comments
Web 2.0 technologies have enabled more and more people to freely comment on different kinds of entities (e.g. sellers, products, services). The large scale of information poses th...
Yue Lu, ChengXiang Zhai, Neel Sundaresan
CVPR
2007
IEEE
16 years 4 min ago
A Bio-inspired Learning Approach for the Classification of Risk Zones in a Smart Space
Learning from experience is a basic task of human brain that is not yet fulfilled satisfactorily by computers. Therefore, in recent years to cope with this issue, bio-inspired app...
Alessio Dore, Matteo Pinasco, Carlo S. Regazzoni