Sciweavers

1667 search results - page 324 / 334
» Extended clause learning
Sort
View
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
14 years 28 days ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
SIGUCCS
2003
ACM
14 years 27 days ago
Teaching with technology, setting an example
Providing instructional technology support for faculty requires a range of skills, from knowledge of software and hardware, to an ability to communicate, teach workshops, and rela...
Trevor Murphy, Mika Hirai
ICIAR
2010
Springer
14 years 13 days ago
Adaptation of SIFT Features for Robust Face Recognition
Abstract. The Scale Invariant Feature Transform (SIFT) is an algorithm used to detect and describe scale-, translation- and rotation-invariant local features in images. The origina...
Janez Krizaj, Vitomir Struc, Nikola Pavesic
MSS
2000
IEEE
119views Hardware» more  MSS 2000»
14 years 1 days ago
Implementing Journaling in a Linux Shared Disk File System
In computer systems today, speed and responsiveness is often determined by network and storage subsystem performance. Faster, more scalable networking interfaces like Fibre Channe...
Kenneth W. Preslan, Andrew P. Barry, Jonathan Bras...
PODS
1999
ACM
151views Database» more  PODS 1999»
13 years 12 months ago
Exact and Approximate Aggregation in Constraint Query
We investigate the problem of how to extend constraint query languages with aggregate operators. We deal with standard relational aggregation, and also with aggregates speci c to ...
Michael Benedikt, Leonid Libkin