Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Memory, Alex"'
Autor:
Kazakova, Vera A., Hwang, Jena D., Dorr, Bonnie J., Wilks, Yorick, Gage, J. Blake, Memory, Alex, Clark, Mark A.
Publikováno v:
FLAIRS-2019
Effective cyber threat recognition and prevention demand comprehensible forecasting systems, as prior approaches commonly offer limited and, ultimately, unconvincing information. We introduce Simplified Plaintext Language (SPLAIN), a natural language
Externí odkaz:
http://arxiv.org/abs/2311.11215
In this appendix we provide additional supplementary material to "A Collective, Probabilistic Approach to Schema Mapping." We include an additional extended example, supplementary experiment details, and proof for the complexity result stated in the
Externí odkaz:
http://arxiv.org/abs/1702.03447
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Annotation graphs, made available through the Linked Data initiative and Semantic Web, have significant scientific value. However, their increasing complexity makes it difficult to fully exploit this value. Graph summaries, which group similar entiti
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1131::979b87c4b9bdcd828628b66abeb74581
https://lirias.kuleuven.be/handle/123456789/356000
https://lirias.kuleuven.be/handle/123456789/356000
Publikováno v:
2016 49th Hawaii International Conference on System Sciences (HICSS); 2016, p2739-2748, 10p
Publikováno v:
2014 IEEE Security & Privacy Workshops; 2014, p277-288, 12p
Autor:
Senator, Ted E., Goldberg, Henry G., Memory, Alex, Young, William T., Rees, Brad, Pierce, Robert, Huang, Daniel, Reardon, Matthew, Bader, David A., Chow, Edmond, Essa, Irfan, Jones, Joshua, Bettadapura, Vinay, Chau, Duen Horng, Green, Oded, Kaya, Oguz, Zakrzewska, Anita, Briscoe, Erica, Mappus, Rudolph IV L., McColl, Robert
Publikováno v:
Proceedings of the 19th ACM SIGKDD International Conference Knowledge Discovery & Data Mining; 8/11/2013, p1393-1401, 9p
Publikováno v:
2013 IEEE Security & Privacy Workshops; 2013, p60-67, 8p