Sciweavers

2043 search results - page 367 / 409
» A convenient category of domains
Sort
View
ESORICS
2004
Springer
14 years 2 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
KDD
2004
ACM
116views Data Mining» more  KDD 2004»
14 years 2 months ago
A system for automated mapping of bill-of-materials part numbers
Part numbers are widely used within an enterprise throughout the manufacturing process. The point of entry of such part numbers into this process is normally via a Bill of Materia...
Jayant Kalagnanam, Moninder Singh, Sudhir Verma, M...
CHI
2010
ACM
14 years 2 months ago
Exploring iterative and parallel human computation processes
Services like Amazon’s Mechanical Turk have opened the door for exploration of processes that outsource computation to humans. These human computation processes hold tremendous ...
Greg Little
MIR
2010
ACM
217views Multimedia» more  MIR 2010»
14 years 2 months ago
Feature selection for content-based, time-varying musical emotion regression
In developing automated systems to recognize the emotional content of music, we are faced with a problem spanning two disparate domains: the space of human emotions and the acoust...
Erik M. Schmidt, Douglas Turnbull, Youngmoo E. Kim
CASES
2003
ACM
14 years 2 months ago
Extending STI for demanding hard-real-time systems
Software thread integration (STI) is a compilation technique which enables the efficient use of an application’s fine-grain idle time on generic processors without special hardw...
Benjamin J. Welch, Shobhit O. Kanaujia, Adarsh See...