Sciweavers

69 search results - page 6 / 14
» The chains model for detecting parts by their context
Sort
View
INEX
2007
Springer
14 years 25 days ago
Using and Detecting Links in Wikipedia
In this paper, we document our efforts at INEX 2007 where we participated in the Ad Hoc Track, the Link the Wiki Track, and the Interactive Track that continued from INEX 2006. Ou...
Khairun Nisa Fachry, Jaap Kamps, Marijn Koolen, Ju...
JSA
2008
74views more  JSA 2008»
13 years 6 months ago
Resource conflict detection in simulation of function unit pipelines
Processor simulators are important parts of processor design toolsets in which they are used to verify and evaluate the properties of the designed processors. While simulating arch...
Pekka Jääskeläinen, Vladimír...
DEON
2008
Springer
13 years 8 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
CN
2004
129views more  CN 2004»
13 years 6 months ago
Measuring normality in HTTP traffic for anomaly-based intrusion detection
In this paper, the problem of measuring normality in HTTP traffic for the purpose of anomaly-based network intrusion detection is addressed. The work carried out is expressed in t...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...
IJCNN
2008
IEEE
14 years 1 months ago
Hybrid learning architecture for unobtrusive infrared tracking support
—The system architecture presented in this paper is designed for helping an aged person to live longer independently in their own home by detecting unusual and potentially hazard...
K. K. Kiran Bhagat, Stefan Wermter, Kevin Burn