Sciweavers

2212 search results - page 345 / 443
» User-Based Active Learning
Sort
View
IJCAI
2007
13 years 11 months ago
Training Conditional Random Fields Using Virtual Evidence Boosting
While conditional random fields (CRFs) have been applied successfully in a variety of domains, their training remains a challenging task. In this paper, we introduce a novel trai...
Lin Liao, Tanzeem Choudhury, Dieter Fox, Henry A. ...
SEC
2008
13 years 11 months ago
Protecting Financial Institutions from Brute-Force Attacks
We examine the problem of protecting online banking accounts from password brute-forcing attacks. Our method is to create a large number of honeypot userID-password pairs. Presenta...
Cormac Herley, Dinei A. F. Florêncio
OWLED
2007
13 years 11 months ago
Ontology-Based Management of the Telehealth Smart Home, Dedicated to Elderly in Loss of Cognitive Autonomy
Taking care of an elderly in loss of cognitive autonomy is a challenging task. Artificial agents, such as the Telehealth Smart Home (TSH) system can facilitate that task. However,...
Fatiha Latfi, Bernard Lefebvre, Céline Desc...
AAAI
2006
13 years 11 months ago
Building Explainable Artificial Intelligence Systems
As artificial intelligence (AI) systems and behavior models in military simulations become increasingly complex, it has been difficult for users to understand the activities of co...
Mark G. Core, H. Chad Lane, Michael van Lent, Dave...
AUSFORENSICS
2004
13 years 11 months ago
Wireless Snort - A WIDS in progress
The Snort intrusion detection system is a widely used and well-regarded open sourcesystem used for the detection of malicious activity in conventional wired networks. Recently, so...
Craig Valli