Sciweavers

20 search results - page 4 / 4
» An effective procedure for constructing a hierarchical text ...
Sort
View
CCS
2007
ACM
14 years 1 months ago
Defining categories to select representative attack test-cases
To ameliorate the quality of protection provided by intrusion detection systems (IDS) we strongly need more effective evaluation and testing procedures. Evaluating an IDS against ...
Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Des...
CHI
2007
ACM
14 years 7 months ago
A study of out-of-turn interaction in menu-based, IVR, voicemail systems
We present the first user study of out-of-turn interaction in menu-based, interactive voice-response systems. Out-ofturn interaction is a technique which empowers the user (unable...
Saverio Perugini, Taylor J. Anderson, William F. M...
CIKM
2004
Springer
13 years 11 months ago
InfoAnalyzer: a computer-aided tool for building enterprise taxonomies
In this paper we study the problem of collecting training samples for building enterprise taxonomies. We develop a computer-aided tool named InfoAnalyzer, which can effectively as...
Li Zhang, Shixia Liu, Yue Pan, Liping Yang
ATAL
2006
Springer
13 years 11 months ago
Continuous refinement of agent resource estimates
The challenge we address is to reason about projected resource usage within a hierarchical task execution framework in order to improve agent effectiveness. Specifically, we seek ...
David N. Morley, Karen L. Myers, Neil Yorke-Smith
KCAP
2005
ACM
14 years 1 months ago
Automated story capture from conversational speech
While storytelling has long been recognized as an important part of effective knowledge management in organizations, knowledge management technologies have generally not distingui...
Andrew S. Gordon, Kavita Ganesan