Sciweavers

496 search results - page 64 / 100
» The use of computational intelligence in intrusion detection...
Sort
View
DRM
2004
Springer
14 years 1 months ago
Tamper detection and localization for categorical data using fragile watermarks
Today, database relations are widely used and distributed over the Internet. Since these data can be easily tampered with, it is critical to ensure the integrity of these data. In...
Yingjiu Li, Huiping Guo, Sushil Jajodia
AAAI
2008
13 years 10 months ago
Learning to Connect Language and Perception
To truly understand language, an intelligent system must be able to connect words, phrases, and sentences to its perception of objects and events in the world. Current natural lan...
Raymond J. Mooney
AIS
2006
Springer
13 years 8 months ago
Computer vision for artists and designers: pedagogic tools and techniques for novice programmers
Abstract This article attempts to demystify computer vision for novice programmers through a survey of new applications in the arts, system design considerations, and contemporary ...
Golan Levin
ICDE
2009
IEEE
251views Database» more  ICDE 2009»
14 years 9 months ago
Contextual Ranking of Keywords Using Click Data
The problem of automatically extracting the most interesting and relevant keyword phrases in a document has been studied extensively as it is crucial for a number of applications. ...
Utku Irmak, Vadim von Brzeski, Reiner Kraft
CHI
2007
ACM
14 years 8 months ago
Understanding and developing models for detecting and differentiating breakpoints during interactive tasks
The ability to detect and differentiate breakpoints during task execution is critical for enabling defer-to-breakpoint policies within interruption management. In this work, we ex...
Shamsi T. Iqbal, Brian P. Bailey