Sciweavers

1759 search results - page 62 / 352
» Using term informativeness for named entity detection
Sort
View
CIKM
2010
Springer
14 years 8 months ago
Rank learning for factoid question answering with linguistic and semantic constraints
This work presents a general rank-learning framework for passage ranking within Question Answering (QA) systems using linguistic and semantic features. The framework enables query...
Matthew W. Bilotti, Jonathan L. Elsas, Jaime G. Ca...
FLAIRS
2010
15 years 4 days ago
Using a Graph-Based Approach for Discovering Cybercrime
The ability to mine data represented as a graph has become important in several domains for detecting various structural patterns. One important area of data mining is anomaly det...
William Eberle, Lawrence B. Holder, Jeffrey Graves
INFOCOM
2011
IEEE
14 years 1 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
ICC
2007
IEEE
15 years 4 months ago
Using Session-Keystroke Mutual Information to Detect Self-Propagating Malicious Codes
— In this paper, we propose an endpoint-based joint network-host anomaly detection technique to detect selfpropagating malicious codes. Our proposed technique is based on the obs...
Syed A. Khayam, Hayder Radha
ACSC
2005
IEEE
15 years 3 months ago
Video Cut Detection using Frame Windows
Segmentation is the first step in managing data for many information retrieval tasks. Automatic audio transcriptions and digital video footage are typically continuous data sourc...
Seyed M. M. Tahaghoghi, Hugh E. Williams, James A....