Sciweavers

222 search results - page 31 / 45
» Representing dialogic argumentation
Sort
View
DSN
2003
IEEE
14 years 1 months ago
Masquerade Detection Using Enriched Command Lines
A masquerade attack, in which one user impersonates another, is among the most serious forms of computer abuse, largely because such attacks are often mounted by insiders, and can...
Roy A. Maxion
HICSS
2002
IEEE
80views Biometrics» more  HICSS 2002»
14 years 1 months ago
Collaboration between Writer and Reviewer through Change Representation Tools
Change representation concerns how changes of text are presented in writing tools. Change representation in collaborative writing can play an important role for the collaborators&...
Hee-Cheol (Ezra) Kim, Kerstin Severinson Eklundh
CONTEXT
1999
Springer
14 years 23 days ago
Putting Similarity Assessments into Context: Matching Functions with the User's Intended Operations
This paper presents a practical application of context for the evaluation of semantic similarity. The work is based on a new model for the assessment of semantic similarity among ...
M. Andrea Rodríguez, Max J. Egenhofer
ECCV
2006
Springer
14 years 5 days ago
A Probabilistic Framework for Correspondence and Egomotion
This paper is an argument for two assertions: First, that by representing correspondence probabilistically, drastically more correspondence information can be extracted from image...
Justin Domke, Yiannis Aloimonos
ESANN
2004
13 years 10 months ago
Reducing connectivity by using cortical modular bands
The way information is represented and processed in a neural network may have important consequences on its computational power and complexity. Basically, information representatio...
Julien Vitay, Nicolas P. Rougier, Fréd&eacu...