Sciweavers

2236 search results - page 347 / 448
» Intrusion detection techniques and approaches
Sort
View
EUROSSC
2009
Springer
14 years 14 days ago
Using Dempster-Shafer Theory of Evidence for Situation Inference
Abstract. In the domain of ubiquitous computing, the ability to identify the occurrence of situations is a core function of being ’contextaware’. Given the uncertain nature of ...
Susan McKeever, Juan Ye, Lorcan Coyle, Simon A. Do...
DAGM
2008
Springer
13 years 11 months ago
Approximate Parameter Learning in Conditional Random Fields: An Empirical Investigation
We investigate maximum likelihood parameter learning in Conditional Random Fields (CRF) and present an empirical study of pseudo-likelihood (PL) based approximations of the paramet...
Filip Korc, Wolfgang Förstner
CGVR
2007
13 years 10 months ago
Evaluation of Stereoscopy and Lit Shading for a Counting Task in Knot Visualization
We present an experiment on depth cues for knot visualization in desktop virtual reality (fishtank VR). We used a within-subjects experiment to investigate stereoscopic visuals an...
Nicholas G. Lipari, Christoph W. Borst
ACL
2006
13 years 10 months ago
FAST - An Automatic Generation System for Grammar Tests
This paper introduces a method for the semi-automatic generation of grammar test items by applying Natural Language Processing (NLP) techniques. Based on manually-designed pattern...
Chia-Yin Chen, Hsien-Chin Liou, Jason S. Chang
SOSP
1997
ACM
13 years 10 months ago
Eraser: A Dynamic Data Race Detector for Multi-Threaded Programs
Multi-threaded programming is difficult and error prone. It is easy to make a mistake in synchronization that produces a data race, yet it can be extremely hard to locate this mi...
Stefan Savage, Michael Burrows, Greg Nelson, Patri...