Sciweavers

2107 search results - page 96 / 422
» b 2007
Sort
View
57
Voted
IJCAI
1989
15 years 1 months ago
An Empirical Comparison of ID3 and Back-propagation
AI and connectionist approaches to learning from examples differ in knowledge-base representation and inductive mechanisms. To explore these differences we experiment with a syste...
Douglas H. Fisher, Kathleen B. McKusick
91
Voted
JURIX
2007
15 years 2 months ago
Using Legal Ontology for Query Enhancement in Generating a Document Summary
In this paper, we have proposed a novel comprehensive structural framework for the construction of ontology from a given legal corpus for the purpose of query enhancement to pick r...
M. Saravanan, B. Ravindran, S. Raman
DAGSTUHL
2001
15 years 2 months ago
A Language-Based Approach to Security
Abstract. Language-based security leverages program analysis and program rewriting to enforce security policies. The approach promises efficient enforcement of fine-grained access ...
Fred B. Schneider, J. Gregory Morrisett, Robert Ha...
CIIT
2007
131views Communications» more  CIIT 2007»
15 years 2 months ago
Intra-federation credential negotiation based on individualized release strategy
In federated world like Shibboleth the release policy- how a member’s personal information to be divulged is set by their home organization. The member has little say in it. In ...
Javed I. Khan, Kailas B. Bobade, Manas Hardas
90
Voted
ICAI
2004
15 years 2 months ago
Supervised Segmentation of Visible Human Data with Image Analogies
Abstract-- We present a new application of the Image Analogies algorithm to be used for image segmentation. Our approach requires supervised training data, so we apply it to the do...
James B. Lackey, Michael D. Colagrosso