Sciweavers

159 search results - page 25 / 32
» Informed Recognition in Software Watermarking
Sort
View
IUI
2004
ACM
14 years 27 days ago
Choosing when to interact with learners
In this paper, we describe a method for pedagogical agents to choose when to interact with learners in interactive learning environments. This method is based on observations of h...
Lei Qu, Ning Wang, W. Lewis Johnson
UIST
2004
ACM
14 years 27 days ago
Augmenting conversations using dual-purpose speech
In this paper, we explore the concept of dual–purpose speech: speech that is socially appropriate in the context of a human– to–human conversation which also provides meanin...
Kent Lyons, Christopher Skeels, Thad Starner, Corn...
VIZSEC
2004
Springer
14 years 25 days ago
Visualizing windows executable viruses using self-organizing maps
This paper concentrates on visualizing computer viruses without using virus specific signature information as a prior stage of the very important problem of detecting computer vi...
InSeon Yoo
ICAI
2008
13 years 9 months ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang
EJC
2010
13 years 2 months ago
Inferencing in Database Semantics
As a computational model of natural language communication, Database Semantics1 (DBS) includes a hearer mode and a speaker mode. For the content to be mapped into language expressi...
Roland Hausser