Sciweavers

1049 search results - page 197 / 210
» A Document Based Framework for Smart Object Systems
Sort
View
CRITIS
2007
13 years 10 months ago
A Malware Detector Placement Game for Intrusion Detection
We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...
IJCAI
2003
13 years 10 months ago
Employing Trainable String Similarity Metrics for Information Integration
The problem of identifying approximately duplicate objects in databases is an essential step for the information integration process. Most existing approaches have relied on gener...
Mikhail Bilenko, Raymond J. Mooney
IJCAI
1989
13 years 10 months ago
Approximation of Indistinct Concepts
This theory on semi-equivalence r e l a t i o n s is an important and useful tool for i n v e s t i g a t i n g c l a s s i f i c a t i o n , pattern r e c o g n i t i o n , p o l...
Zhang Mingyi
AIR
2006
129views more  AIR 2006»
13 years 9 months ago
Attention driven reference resolution in multimodal contexts
In recent years a a number of psycholinguistic experiments have pointed to the interaction between language and vision. In particular, the interaction between visual attention and ...
John D. Kelleher
JHSN
2006
267views more  JHSN 2006»
13 years 9 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...