Sciweavers

284 search results - page 43 / 57
» A new approach to evaluate GP schema in context
Sort
View
RAID
1999
Springer
13 years 12 months ago
Improving Intrusion Detection Performance using Keyword Selection and Neural Networks
The most common computer intrusion detection systems detect signatures of known attacks by searching for attack-specific keywords in network traffic. Many of these systems suffer ...
Richard Lippmann, Robert K. Cunningham
COMPGEOM
1997
ACM
13 years 12 months ago
Robust Proximity Queries: An Illustration of Degree-Driven Algorithm Design
Abstract. In the context of methodologies intended to confer robustness to geometric algorithms, we elaborate on the exact-computation paradigm and formalize the notion of degree o...
Giuseppe Liotta, Franco P. Preparata, Roberto Tama...
LREC
2010
188views Education» more  LREC 2010»
13 years 9 months ago
Pattern-Based Extraction of Negative Polarity Items from Dependency-Parsed Text
We describe a new method for extracting Negative Polarity Item candidates (NPI candidates) from dependency-parsed German text corpora. Semi-automatic extraction of NPIs is a chall...
Fabienne Fritzinger, Frank Richter, Marion Weller
ECIS
2004
13 years 9 months ago
From asp to web services: identifying key performance areas and indicators for healthcare
Value creation from e-business for customers in healthcare is an important topic in academic and practitioner circles. This paper reports the findings from a two-year research stu...
Matthew W. Guah, Wendy L. Currie
ENTCS
2007
114views more  ENTCS 2007»
13 years 7 months ago
Reporting Failures in Functional Logic Programs
Computing with failures is a typical programming technique in functional logic programs. However, there are also situations where a program should not fail (e.g., in a determinist...
Michael Hanus