Sciweavers

515 search results - page 47 / 103
» Measuring Voter-Controlled Privacy
Sort
View
ISI
2006
Springer
13 years 11 months ago
Computational Modeling and Experimental Validation of Aviation Security Procedures
Security of civil aviation has become a major concern in recent years, leading to a variety of protective measures related to airport and aircraft security to be established by re...
Uwe Glässer, Sarah Rastkar, Mona Vajihollahi
ISI
2007
Springer
13 years 11 months ago
Host Based Intrusion Detection using Machine Learning
—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions, such as anti-virus tools, rely heavily on prior explicit knowledge of specific instan...
Robert Moskovitch, Shay Pluderman, Ido Gus, Dima S...
ISI
2002
Springer
13 years 11 months ago
Getting right answers from incomplete multidimensional databases
Dealing with large volumes of data, OLAP data cubes aggregated values are often spoiled by errors due to missing values in detailed data. This paper suggests to adjust aggregate an...
Sabine Goutier, Georges Hébrail, Vér...
SP
2002
IEEE
128views Security Privacy» more  SP 2002»
13 years 10 months ago
Fitting hidden Markov models to psychological data
Markov models have been used extensively in psychology of learning. Applications of hidden Markov models are rare however. This is partially due to the fact that comprehensive stat...
Ingmar Visser, Maartje E. J. Raijmakers, Peter C. ...
GIL
2010
13 years 9 months ago
Model-based Approach to Quantify and Regionalize Peanut Production in the Major Peanut Production Provinces in the People's Repu
: China is the largest peanut producer in the world and peanut therefore an essential economic product earning significant income for China’s farmers. Major provinces for peanut ...
Heike Knörzer, Simone Graeff-Hönninger, ...