Sciweavers

710 search results - page 130 / 142
» An Approach for Detecting Learning Styles in Learning Manage...
Sort
View
JMLR
2010
185views more  JMLR 2010»
13 years 2 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
RAID
2005
Springer
14 years 1 months ago
FLIPS: Hybrid Adaptive Intrusion Prevention
Intrusion detection systems are fundamentally passive and fail–open. Because their primary task is classification, they do nothing to prevent an attack from succeeding. An intru...
Michael E. Locasto, Ke Wang, Angelos D. Keromytis,...
MICCAI
2009
Springer
14 years 9 months ago
Fast and Robust 3-D MRI Brain Structure Segmentation
We present a novel method for the automatic detection and segmentation of (sub-)cortical gray matter structures in 3-D magnetic resonance images of the human brain. Essentially, th...
Michael Wels, Yefeng Zheng, Gustavo Carneiro, M...
AAAI
2006
13 years 9 months ago
Overcoming the Brittleness Bottleneck using Wikipedia: Enhancing Text Categorization with Encyclopedic Knowledge
When humans approach the task of text categorization, they interpret the specific wording of the document in the much larger context of their background knowledge and experience. ...
Evgeniy Gabrilovich, Shaul Markovitch
MICAI
2005
Springer
14 years 1 months ago
Knowledge and Reasoning Supported by Cognitive Maps
A powerful and useful approach for modeling knowledge and qualitative reasoning is the Cognitive Map. The background of Cognitive Maps is the research about learning environments c...
Alejandro Peña Ayala, Humberto Sossa, Agust...