Sciweavers

2259 search results - page 267 / 452
» Addressing Mode Selection
Sort
View
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
14 years 1 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley
ISSS
1997
IEEE
142views Hardware» more  ISSS 1997»
14 years 1 months ago
Optimization Method for Broadband Modem FIR Filter Design using Common Subexpression Elimination
- An approach for broadband modem FIR filter design optimization is presented. It addresses the minimization of the number of addersubtractors used in the hardware implementation o...
Robert Pasko, Patrick Schaumont, Veerle Derudder, ...
VISUALIZATION
1996
IEEE
14 years 1 months ago
Generation of Transfer Functions with Stochastic Search Techniques
This paper presents a novel approach to assist the user in exploring appropriate transfer functions for the visualization of volumetric datasets. The search for a transfer functio...
Taosong He, Lichan Hong, Arie E. Kaufman, Hanspete...
VL
1994
IEEE
159views Visual Languages» more  VL 1994»
14 years 1 months ago
Interaction in Really Graphical User Interfaces
Employing diagrams in the UI causes problems that don't exist in so called Graphical User Interfaces. We are implementing a tool for generating editors for a certain class of...
Gerhard Viehstaedt, Mark Minas
SIGIR
2010
ACM
14 years 1 months ago
Short text classification in twitter to improve information filtering
In microblogging services such as Twitter, the users may become overwhelmed by the raw data. One solution to this problem is the classification of short text messages. As short te...
Bharath Sriram, Dave Fuhry, Engin Demir, Hakan Fer...