Sciweavers

2084 search results - page 338 / 417
» Knowledge Exploitation from the Web
Sort
View
IWIA
2006
IEEE
14 years 3 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
MIR
2006
ACM
141views Multimedia» more  MIR 2006»
14 years 3 months ago
Mining temporal patterns of movement for video content classification
Scalable approaches to video content classification are limited by an inability to automatically generate representations of events ode abstract temporal structure. This paper pre...
Michael Fleischman, Philip DeCamp, Deb Roy
OZCHI
2006
ACM
14 years 3 months ago
Indexical interaction design for context-aware mobile computer systems
This position paper outlines a current research project focusing on the challenges of interaction design for context-aware mobile computer systems. This challenge is approached fr...
Jesper Kjeldskov, Jeni Paay
ICSM
2005
IEEE
14 years 2 months ago
Analyzing Feature Traces to Incorporate the Semantics of Change in Software Evolution Analysis
Many of the approaches that analyze software evolution consider a static perspective of a system. Static analysis approaches focus on the evolution of static software entities suc...
Orla Greevy, Stéphane Ducasse, Tudor G&icir...
INFOCOM
2005
IEEE
14 years 2 months ago
Farsighted users harness network time-diversity
Abstract— Fluctuations in network conditions are a common phenomenon. They arise in the current wired Internet due to changes in demand, and in wireless networks due to changing ...
Peter B. Key, Laurent Massoulié, Milan Vojn...