Sciweavers

1030 search results - page 41 / 206
» Partial Detectability Profiles
Sort
View
ACL
2006
13 years 10 months ago
Semi-Supervised Learning of Partial Cognates Using Bilingual Bootstrapping
Partial cognates are pairs of words in two languages that have the same meaning in some, but not all contexts. Detecting the actual meaning of a partial cognate in context can be ...
Oana Frunza, Diana Zaiu Inkpen
ACSAC
2004
IEEE
14 years 7 days ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
CCS
2006
ACM
14 years 7 days ago
Evading network anomaly detection systems: formal reasoning and practical techniques
Attackers often try to evade an intrusion detection system (IDS) when launching their attacks. There have been several published studies in evasion attacks, some with available to...
Prahlad Fogla, Wenke Lee
VLSID
1998
IEEE
117views VLSI» more  VLSID 1998»
14 years 22 days ago
Partial Scan Selection Based on Dynamic Reachability and Observability Information
A partial scan selection strategy is proposed in which flip-flops are selected via newly proposed dynamic reachability and observability measures such that the remaining hard-to-d...
Michael S. Hsiao, Gurjeet S. Saund, Elizabeth M. R...
SLP
1989
87views more  SLP 1989»
13 years 9 months ago
Partial Evaluation in Prolog: Some Improvements about Cut
Two main aspects of Partial Evaluation for Prolog programs are considered: treatment of cuts and control of recursion. The analysis about cut is exhaustive: we consider occurrence...
Michele Bugliesi, F. Russo