Sciweavers

719 search results - page 80 / 144
» What HMMs Can Do
Sort
View
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
14 years 28 days ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...
CAISE
2003
Springer
14 years 27 days ago
Designing a Federated Multimedia Information System on the Semantic Web
A federated Web-based multimedia information system on one hand gathers its data from various Web sources, on the other hand offers the end-user a rich semantics describing its co...
Richard Vdovjak, Peter Barna, Geert-Jan Houben
KR
2010
Springer
14 years 13 days ago
I Don't Want to Think About it Now: Decision Theory with Costly Computation
Computation plays a major role in decision making. Even if an agent is willing to ascribe a probability to all states and a utility to all outcomes, and maximize expected utility,...
Joseph Y. Halpern
TOOLS
2000
IEEE
14 years 1 days ago
Extending Business Objects with Business Rules
It is common to imbed business rules within the code of distributed object systems. When business practices and/or policies change, as they often do, it is difficult if not imposs...
Isabelle Rouvellou, Lou Degenaro, Kevin Rasmus, Da...
CHI
1999
ACM
13 years 12 months ago
Touch-Sensing Input Devices
We can touch things, and our senses tell us when our hands are touching something. But most computer input devices cannot detect when the user touches or releases the device or so...
Ken Hinckley, Mike Sinclair