Sciweavers

1802 search results - page 187 / 361
» Model-based Theory Combination
Sort
View
162
Voted
ISSA
2008
15 years 4 months ago
Immune System Based Intrusion Detection System
The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still nee...
Christoph Ehret, Ulrich Ultes-Nitsche
89
Voted
LREC
2008
90views Education» more  LREC 2008»
15 years 4 months ago
A Proper Approach to Japanese Morphological Analysis: Dictionary, Model, and Evaluation
In this paper, we discuss lemma identification in Japanese morphological analysis, which is crucial for a proper formulation of morphological analysis that benefits not only NLP r...
Yasuharu Den, Junpei Nakamura, Toshinobu Ogiso, Hi...
114
Voted
AAAI
2006
15 years 4 months ago
Decision Tree Methods for Finding Reusable MDP Homomorphisms
straction is a useful tool for agents interacting with environments. Good state abstractions are compact, reuseable, and easy to learn from sample data. This paper and extends two...
Alicia P. Wolfe, Andrew G. Barto
137
Voted
CSREASAM
2006
15 years 4 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
120
Voted
ECIS
2003
15 years 4 months ago
The transformation of work in european banks: an analysis of IT skills
Researches that have recently investigated the impact of developments in Information Technologies (IT) on human capital in the banking industry analysed only marginally the evolut...
Paolo Neirotti, Emilio Paolucci