Sciweavers

4280 search results - page 767 / 856
» Mechanisms for information elicitation
Sort
View
DFN
2003
13 years 11 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
NIPS
1998
13 years 11 months ago
Divisive Normalization, Line Attractor Networks and Ideal Observers
Gain control by divisive inhibition, a.k.a. divisive normalization, has been proposed to be a general mechanism throughout the visual cortex. We explore in this study the statisti...
Sophie Deneve, Alexandre Pouget, Peter E. Latham
WSC
2000
13 years 11 months ago
Anticipatory Planning Support System
A new approach to military operations, called Anticipatory Planning and Adaptive Execution, treats planning and execution as a tightly coupled, single process, and replaces reacti...
John R. Surdu, John M. D. Hill, Udo W. Pooch
USITS
1997
13 years 11 months ago
Lightweight Security Primitives for E-Commerce
Emerging applications in electronic commerce often involve very low-cost transactions, which execute in the context of ongoing, extended clientserver relationships. For example, c...
Yossi Matias, Alain J. Mayer, Abraham Silberschatz
EACL
1989
ACL Anthology
13 years 11 months ago
On The Generative Power Of Two-Level Morphological Rules
Koskenniemi's model of two-level morphology has been very influential in recent years, but definitions of the formalism have generally been phrased in terms of a compilation ...
Graeme D. Ritchie