Sciweavers

787 search results - page 122 / 158
» A Survey on Transfer Learning
Sort
View
SEC
2008
13 years 9 months ago
Protecting Financial Institutions from Brute-Force Attacks
We examine the problem of protecting online banking accounts from password brute-forcing attacks. Our method is to create a large number of honeypot userID-password pairs. Presenta...
Cormac Herley, Dinei A. F. Florêncio
AIIDE
2006
13 years 9 months ago
Building Test Beds for AI with the Q3 Mod Base
We extend the open source Quake 3 Arena code base released by Id Software to include modification friendly code segments, art asset blueprints, external agent control and percepti...
G. Michael Youngblood, Billy Nolen, Michael Ross, ...
IIS
2001
13 years 9 months ago
Discovering Multi-head Attributional Rules in Large Databases
: A method for discovering multi-head attributional rules in large databases is presented and illustrated by results from an implemented program. Attributional rules (a.k.a. attrib...
Jerzy Clowinski, Ryszard S. Michalski
COLING
2002
13 years 8 months ago
Paraphrasing of Chinese Utterances
One of the key issues in spoken language translation is how to deal with unrestricted expressions in spontaneous utterances. This research is centered on the development of a Chin...
Yujie Zhang, Kazuhide Yamamoto
MTA
2000
72views more  MTA 2000»
13 years 8 months ago
An Interactive Telelecture System with Hybrid ATM/IP Networking
Currently, there is much debate whether ATM (Asynchronous Transfer Mode) or IP (Internet Protocol) is the better internetworking technology for multiparty multimedia applications....
Jörg Liebeherr, Steven R. Brown, Rick Alberts...