Sciweavers

1636 search results - page 100 / 328
» From Usability Lab to
Sort
View
143
Voted
ICMLA
2003
15 years 4 months ago
Robust Support Vector Machines for Anomaly Detection in Computer Security
— Using the 1998 DARPA BSM data set collected at MIT’s Lincoln Labs to study intrusion detection systems, the performance of robust support vector machines (RVSMs) was compared...
Wenjie Hu, Yihua Liao, V. Rao Vemuri
86
Voted
ANLP
1997
81views more  ANLP 1997»
15 years 4 months ago
Name pronunciation in German text-to-speech synthesis
We describe the name analysis and pronunciation component in the German version of the Bell Labs multilingual text-tospeech system. We concentrate on street names because they enc...
Stefanie Jannedy, Bernd Möbius
110
Voted
ANLP
1992
103views more  ANLP 1992»
15 years 4 months ago
Real-time linguistic analysis for continuous speech understanding
This paper describes the approach followed in the development of the linguistic processor of the continuous speech dialog system implemented at our labs. The application scenario ...
Paolo Baggia, Elisabetta Gerbino, Egidio P. Giachi...
115
Voted
EXPERT
2008
119views more  EXPERT 2008»
15 years 3 months ago
Building a Pragmatic Semantic Web
One of the great benefits that Semantic Web (SW) technology offers is facilitating large scale integration and sharing of distributed data sources. Transferring this technology fro...
Harith Alani, Peter Chandler, Wendy Hall, Kieron O...
COMPSEC
2004
91views more  COMPSEC 2004»
15 years 3 months ago
Predicting the intrusion intentions by observing system call sequences
Identifying the intentions or attempts of the monitored agents through observations is very vital in computer network security. In this paper, a plan recognition method for predict...
Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Pein...