Sciweavers

883 search results - page 148 / 177
» Knowledge Based Reconstruction of Buildings
Sort
View
NSPW
2004
ACM
14 years 29 days ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
SEMWEB
2004
Springer
14 years 27 days ago
Query Answering for OWL-DL with Rules
Both OWL-DL and function-free Horn rules3 are decidable logics with interesting, yet orthogonal expressive power: from the rules perspective, OWL-DL is restricted to tree-like rule...
Boris Motik, Ulrike Sattler, Rudi Studer
SIGIR
2003
ACM
14 years 24 days ago
The Personalized, Collaborative Digital Library Environment CYCLADES and Its Collections Management
Usually, a Digital Library (DL) is an information resource where users may submit queries to satisfy their daily information need. The CYCLADES system envisages a DL additionally a...
Leonardo Candela, Umberto Straccia
CIKM
2003
Springer
14 years 23 days ago
Misuse detection for information retrieval systems
We present a novel approach to detect misuse within an information retrieval system by gathering and maintaining knowledge of the behavior of the user rather than anticipating att...
Rebecca Cathey, Ling Ma, Nazli Goharian, David A. ...
CMMR
2003
Springer
121views Music» more  CMMR 2003»
14 years 23 days ago
Evolving Automatically High-Level Music Descriptors from Acoustic Signals
High-Level music descriptors are key ingredients for music information retrieval systems. Although there is a long tradition in extracting information from acoustic signals, the fi...
François Pachet, Aymeric Zils