Sciweavers

1309 search results - page 106 / 262
» A Generic Approach to Topic Models
Sort
View
SPIN
2009
Springer
14 years 4 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
FTCS
1998
79views more  FTCS 1998»
13 years 11 months ago
Proving Correctness of a Controller Algorithm for the RAID Level 5 System
Most RAID controllers implemented in industry are complicated and di cult to reason about. This complexity has led to software and hardware systems that are di cult to debug and h...
Mandana Vaziri, Nancy A. Lynch, Jeannette M. Wing
ICIP
2001
IEEE
14 years 11 months ago
A comparison of discrete and continuous output modeling techniques for a pseudo-2D hidden Markov model face recognition system
Face recognition has become an important topic within the field of pattern recognition and computer vision. In this field a number of different approaches to feature extraction, m...
Frank Wallhoff, Stefan Eickeler, Gerhard Rigoll
CAISE
2006
Springer
14 years 1 months ago
Modeling User Behaviour Aware WebSites with PRML
Adaptive websites usually change as effect of user navigational actions. Most current web engineering approaches (which consider personalization) allow to detect basic user browsin...
Irene Garrigós, Jaime Gómez
TREC
2003
13 years 11 months ago
HARD Experiment at Maryland: From Need Negotiation to Automated HARD Process
Our aim of participating in this year’s High Accuracy Retrieval from Documents (HARD) track is to explore the possibility of developing an automated HARD retrieval model by leve...
Daqing He, Dina Demner-Fushman