Sciweavers

122 search results - page 14 / 25
» Modeling the Spread of Active Worms
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
NN
2008
Springer
129views Neural Networks» more  NN 2008»
13 years 7 months ago
Neurolinguistic approach to natural language processing with applications to medical text analysis
Brain processes responsible for understanding language are approximated by spreading activation in semantic networks, providing enhanced representations that involve concepts not ...
Wlodzislaw Duch, Pawel Matykiewicz, John Pestian
JASIS
2008
76views more  JASIS 2008»
13 years 7 months ago
Using importance flooding to identify interesting networks of criminal activity
Abstract. In spite of policy concerns and high costs, the law enforcement community is investing heavily in data sharing initiatives. Cross-jurisdictional criminal justice informat...
Byron Marshall, Hsinchun Chen, Siddharth Kaza
ICANN
2007
Springer
14 years 1 months ago
Towards Understanding of Natural Language: Neurocognitive Inspirations
Neurocognitive processes responsible for representation of meaning and understanding of words are investigated. First a review of current knowledge about word representation, recen...
Wlodzislaw Duch, Pawel Matykiewicz, John Pestian
IUI
2005
ACM
14 years 1 months ago
ScentHighlights: highlighting conceptually-related sentences during reading
Researchers have noticed that readers are increasingly skimming instead of reading in depth. Skimming also occur in re-reading activities, where the goal is to recall specific top...
Ed Huai-hsin Chi, Lichan Hong, Michelle Gumbrecht,...