Sciweavers

1086 search results - page 190 / 218
» Knowledge-based part correspondence
Sort
View
CCS
2004
ACM
14 years 2 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
ECAI
2004
Springer
14 years 2 months ago
A Context-Based Model of Attention
d abstract)1 Niek Bergboer Eric Postma Jaap van den Herik Institute for Knowledge and Agent Technology, Universiteit Maastricht, P.O. Box 616, 6200 MD Maastricht It is well known t...
Niek Bergboer, Eric O. Postma, H. Jaap van den Her...
PRICAI
2004
Springer
14 years 2 months ago
Dynamically Determining Affect During Scripted Dialogue
Autonomous synthetic actors performing in live stage performances must be capable of generating speech that is not only lexically correct, but emotionally correct; affect can be co...
Tony A. Meyer
ROCAI
2004
Springer
14 years 2 months ago
Learning Mixtures of Localized Rules by Maximizing the Area Under the ROC Curve
We introduce a model class for statistical learning which is based on mixtures of propositional rules. In our mixture model, the weight of a rule is not uniform over the entire ins...
Tobias Sing, Niko Beerenwinkel, Thomas Lengauer
TACAS
2004
Springer
108views Algorithms» more  TACAS 2004»
14 years 2 months ago
Model Checking Discounted Temporal Properties
Temporal logic is two-valued: formulas are interpreted as either true or false. When applied to the analysis of stochastic systems, or systems with imprecise formal models, tempor...
Luca de Alfaro, Marco Faella, Thomas A. Henzinger,...