Sciweavers

309 search results - page 56 / 62
» his 2007
Sort
View
108
Voted
EMNLP
2008
15 years 1 months ago
Modeling Annotators: A Generative Approach to Learning from Annotator Rationales
A human annotator can provide hints to a machine learner by highlighting contextual "rationales" for each of his or her annotations (Zaidan et al., 2007). How can one ex...
Omar Zaidan, Jason Eisner
122
Voted
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
15 years 6 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...
89
Voted
JASIS
2008
123views more  JASIS 2008»
15 years 7 days ago
Democratic theory in library information science
: A recent article by Joseph Buschman regrets that democratic theory is an unfinished idea. The argument appears to assume an essential relationship between library information sci...
Michael K. Buckland
ISI
2008
Springer
15 years 7 days ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
115
Voted
WWW
2007
ACM
16 years 28 days ago
Geotracker: geospatial and temporal RSS navigation
The Web is rapidly moving towards a platform for mass collaboration in content production and consumption. Fresh content on a variety of topics, people, and places is being create...
Yih-Farn Robin Chen, Giuseppe Di Fabbrizio, David ...