Sciweavers

2075 search results - page 369 / 415
» Learning better transliterations
Sort
View
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
15 years 9 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
147
Voted
HICSS
2003
IEEE
215views Biometrics» more  HICSS 2003»
15 years 9 months ago
A Field Study of Use of Synchronous Chat in Online Courses
A field study of Computer Mediated Communication (CMC) as used in higher education asks the questions, "Will students take part in synchronous chat sessions if they are sched...
David H. Spencer, Starr Roxanne Hiltz
EDBT
2010
ACM
151views Database» more  EDBT 2010»
15 years 9 months ago
Warm cache costing: a feedback optimization technique for buffer pool aware costing
Most modern RDBMS depend on the query processing optimizer’s cost model to choose the best execution plan for a given query. Since the physical IO (PIO) is a costly operation to...
H. S. Ramanujam, Edwin Seputis
169
Voted
COOPIS
2002
IEEE
15 years 9 months ago
Discovering Emergent Virtual Work Processes in Collaborative Systems
The design of virtual workplaces that can support virtual work processes has traditionally been either ad-hoc, or has been influenced by the top-down approaches, such as ‘virtua...
Simeon J. Simoff, Robert P. Biuk-Aghai
CICLING
2006
Springer
15 years 7 months ago
Automatic Acquisition of Semantic-Based Question Reformulations for Question Answering
Abstract. In this paper, we present a method for the automatic acquisition of semantic-based reformulations from natural language questions. Our goal is to find useful and generic ...
Jamileh Yousefi, Leila Kosseim