Sciweavers

1318 search results - page 201 / 264
» Aggregation-based model reduction of a Hidden Markov Model
Sort
View
JAIHC
2010
205views more  JAIHC 2010»
15 years 3 months ago
Soft computing in intrusion detection: the state of the art
The state of the art is explored in using soft computing (SC) methods for network intrusion detection, including the examination of efforts in ten specific areas of SC as well as ...
Chet Langin, Shahram Rahimi
ANOR
2010
139views more  ANOR 2010»
15 years 3 months ago
Some operations research methods for analyzing protein sequences and structures
Operations Research is probably one of the most successful fields of applied mathematics used in Economics, Physics, Chemistry, almost everywhere onehastoanalyzehugeamountsofdata.L...
Piotr Lukasiak, Jacek Blazewicz, Maciej Milostan
UIST
2010
ACM
15 years 2 months ago
Gesture search: a tool for fast mobile data access
Modern mobile phones can store a large amount of data, such as contacts, applications and music. However, it is difficult to access specific data items via existing mobile user in...
Yang Li
USS
2010
15 years 2 months ago
Acoustic Side-Channel Attacks on Printers
We examine the problem of acoustic emanations of printers. We present a novel attack that recovers what a dotmatrix printer processing English text is printing based on a record o...
Michael Backes, Markus Dürmuth, Sebastian Ger...
ACL
2009
15 years 2 months ago
Do Automatic Annotation Techniques Have Any Impact on Supervised Complex Question Answering?
In this paper, we analyze the impact of different automatic annotation methods on the performance of supervised approaches to the complex question answering problem (defined in th...
Yllias Chali, Sadid A. Hasan, Shafiq R. Joty