Sciweavers

611 search results - page 95 / 123
» Knowledge Acquisition Evaluation Using Simulated Experts
Sort
View
CNSM
2010
13 years 5 months ago
Effective acquaintance management for Collaborative Intrusion Detection Networks
Abstract--An effective Collaborative Intrusion Detection Network (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their knowledge and opinions...
Carol J. Fung, Jie Zhang, Raouf Boutaba
MM
2005
ACM
164views Multimedia» more  MM 2005»
14 years 1 months ago
Automatic discovery of query-class-dependent models for multimodal search
We develop a framework for the automatic discovery of query classes for query-class-dependent search models in multimodal retrieval. The framework automatically discovers useful q...
Lyndon S. Kennedy, Apostol Natsev, Shih-Fu Chang
ACMDIS
2004
ACM
14 years 1 months ago
Making tea: iterative design through analogy
The success of translating an analog or manual practice into a digital interactive system may depend on how well that translation captures not only the functional what and how asp...
Monica M. C. Schraefel, Gareth V. Hughes, Hugo R. ...
ICIAP
2007
ACM
14 years 7 months ago
A Method for Blur and Similarity Transform Invariant Object Recognition
In this paper, we propose novel blur and similarity transform (i.e. rotation, scaling and translation) invariant features for the recognition of objects in images. The features ar...
Janne Heikkilä, Ville Ojansivu
HICSS
2007
IEEE
150views Biometrics» more  HICSS 2007»
14 years 2 months ago
Security Ontologies: Improving Quantitative Risk Analysis
— IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-se...
Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, E...