Sciweavers

87 search results - page 12 / 18
» Evaluating Lost Person Behavior Models
Sort
View
ICVS
2003
Springer
14 years 2 months ago
Trajectory Based Assessment of Coordinated Human Activity
Most approaches to detection and classification of human activity deal with observing individual persons. However, people often tend to organize into groups to achieve certain goa...
Marko Jug, Janez Pers, Branko Dezman, Stanislav Ko...
AAAI
2006
13 years 11 months ago
Contract Enactment in Virtual Organizations: A Commitment-Based Approach
A virtual organization (VO) is a dynamic collection of entities (individuals, enterprises, and information resources) collaborating on some computational activity. VOs are an emer...
Yathiraj B. Udupi, Munindar P. Singh
SIGIR
2004
ACM
14 years 3 months ago
Display time as implicit feedback: understanding task effects
Recent research has had some success using the length of time a user displays a document in their web browser as implicit feedback for document preference. However, most studies h...
Diane Kelly, Nicholas J. Belkin
ISSTA
2012
ACM
12 years 2 days ago
A quantitative study of accuracy in system call-based malware detection
Over the last decade, there has been a significant increase in the number and sophistication of malware-related attacks and infections. Many detection techniques have been propos...
Davide Canali, Andrea Lanzi, Davide Balzarotti, Ch...
CCS
2004
ACM
14 years 3 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...