Sciweavers

1172 search results - page 195 / 235
» Approximate Reasoning Based on Similarity
Sort
View
NSPW
2004
ACM
14 years 3 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
ICMI
2004
Springer
152views Biometrics» more  ICMI 2004»
14 years 3 months ago
Exploiting prosodic structuring of coverbal gesticulation
Although gesture recognition has been studied extensively, communicative, affective, and biometrical “utility” of natural gesticulation remains relatively unexplored. One of t...
Sanshzar Kettebekov
APSEC
2002
IEEE
14 years 3 months ago
On Detection of Gapped Code Clones using Gap Locations
It is generally said that code clone is one of the factors to make software maintenance difficult. A code clone is a code portion in source files that is identical or similar to...
Yasushi Ueda, Toshihiro Kamiya, Shinji Kusumoto, K...
SIGIR
1998
ACM
14 years 2 months ago
A Language Modeling Approach to Information Retrieval
Abstract Models of document indexing and document retrieval have been extensively studied. The integration of these two classes of models has been the goal of several researchers b...
Jay M. Ponte, W. Bruce Croft
SP
1996
IEEE
136views Security Privacy» more  SP 1996»
14 years 2 months ago
On two Proposals for On-line Bankcard Payments using Open Networks: Problems and Solutions
Recently, two major bankcard payment instrument operators VISA and MasterCard published speci cations for securing bankcard payment transactions on open networks for open scrutiny...
Wenbo Mao