Sciweavers

458 search results - page 71 / 92
» Automatic Evaluation of Intrusion Detection Systems
Sort
View
ICPR
2008
IEEE
14 years 11 months ago
Evolving boundary detectors for natural images via Genetic Programming
Boundary detection constitutes a crucial step in many computer vision tasks. We present a novel learning approach to automatically construct a boundary detector for natural images...
Ilan Kadar, Moshe Sipper, Ohad Ben-Shahar
CIKM
2005
Springer
14 years 3 months ago
MailRank: using ranking for spam detection
Can we use social networks to combat spam? This paper investigates the feasibility of MailRank, a new email ranking and classification scheme exploiting the social communication ...
Paul-Alexandru Chirita, Jörg Diederich, Wolfg...
ACL
2000
13 years 11 months ago
Inducing Probabilistic Syllable Classes Using Multivariate Clustering
An approach to automatic detection of syllable structure is presented. We demonstrate a novel application of EM-based clustering to multivariate data, exempli ed by the induction ...
Karin Müller, Bernd Möbius, Detlef Presc...
SKG
2006
IEEE
14 years 3 months ago
Security Attack Ontology for Web Services
Web services (WS) have become a significant part of the Web because of such attractive features as simple to use, platform independence, and XML/SOAP support. However, these featu...
Artem Vorobiev, Jun Han
AIHC
2007
Springer
14 years 4 months ago
Affect Detection and an Automated Improvisational AI Actor in E-Drama
Enabling machines to understand emotions and feelings of the human users in their natural language textual input during interaction is a challenging issue in Human Computing. Our w...
Li Zhang, Marco Gillies, John A. Barnden, Robert J...