Sciweavers

618 search results - page 94 / 124
» New Results on the Performance Effects of Autocorrelated Flo...
Sort
View
CSE
2009
IEEE
14 years 2 months ago
A Network-Aware Distributed Membership Protocol for Collaborative Defense
— To counteract current trends in network malware, distributed solutions have been developed that harness the power of collaborative end-host sensors. While these systems greatly...
David Zage, Carl Livadas, Eve M. Schooler
CHI
2000
ACM
13 years 12 months ago
Providing integrated toolkit-level support for ambiguity in recognition-based interfaces
Interfaces based on recognition technologies are used extensively in both the commercial and research worlds. But recognizers are still error-prone, and this results in human perf...
Jennifer Mankoff, Scott E. Hudson, Gregory D. Abow...
SIGIR
2010
ACM
13 years 11 months ago
Image search by concept map
In this paper, we present a novel image search system, image search by concept map. This system enables users to indicate not only what semantic concepts are expected to appear bu...
Hao Xu, Jingdong Wang, Xian-Sheng Hua, Shipeng Li
ACTAC
2006
126views more  ACTAC 2006»
13 years 7 months ago
Named Entity Recognition for Hungarian Using Various Machine Learning Algorithms
In this paper we introduce a statistical Named Entity recognizer (NER) system for the Hungarian language. We examined three methods for identifying and disambiguating proper nouns...
Richárd Farkas, György Szarvas, Andr&a...
TSE
2010
230views more  TSE 2010»
13 years 2 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...