Sciweavers

4273 search results - page 672 / 855
» Improving proactive information systems
Sort
View
LISA
2001
15 years 5 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
128
Voted
IC
2003
15 years 5 months ago
Concept Based Query Enhancement in the ARCH Search Agent
The quality of the search experience has been an enduring problem for the World Wide Web. One of the well-known difficulties is the tendency of users to use short, under-specified...
Ahu Sieg, Bamshad Mobasher, Steven L. Lytinen, Rob...
USS
2004
15 years 5 months ago
Static Disassembly of Obfuscated Binaries
Disassembly is the process of recovering a symbolic representation of a program's machine code instructions from its binary representation. Recently, a number of techniques h...
Christopher Krügel, William K. Robertson, Fre...
ACL
1998
15 years 5 months ago
Dialogue Management in Vector-Based Call Routing
This paper describes a domain independent, automatically trained call router which directs customer calls based on their response to an open-ended "How may I direct your call...
Jennifer Chu-Carroll, Bob Carpenter
ANLP
2000
109views more  ANLP 2000»
15 years 5 months ago
Predicting Automatic Speech Recognition Performance Using Prosodic Cues
In spoken dialogue systems, it is important for a system to know how likely a speech recognition hypothesis is to be correct, so it can reprompt for fresh input, or, in cases wher...
Diane J. Litman, Julia Hirschberg, Marc Swerts