Sciweavers

1698 search results - page 298 / 340
» Who Students Interact With
Sort
View
CRITIS
2007
13 years 11 months ago
A Malware Detector Placement Game for Intrusion Detection
We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...
DBSEC
2007
104views Database» more  DBSEC 2007»
13 years 11 months ago
New Paradigm of Inference Control with Trusted Computing
Abstract. The database server is a crucial bottleneck in traditional inference control architecture, as it enforces highly computation-intensive auditing for all users who query th...
Yanjiang Yang, Yingjiu Li, Robert H. Deng
LREC
2010
129views Education» more  LREC 2010»
13 years 11 months ago
The Indiana "Cooperative Remote Search Task" (CReST) Corpus
This paper introduces a novel corpus of natural language dialogues obtained from humans performing a cooperative, remote, search task (CReST) as it occurs naturally in a variety o...
Kathleen M. Eberhard, Hannele Nicholson, Sandra K&...
LREC
2010
173views Education» more  LREC 2010»
13 years 11 months ago
Heterogeneous Data Sources for Signed Language Analysis and Synthesis: The SignCom Project
This paper describes how heterogeneous data sources captured in the SignCom project may be used for the analysis and synthesis of French Sign Language (LSF) utterances. The captur...
Kyle Duarte, Sylvie Gibet
IIWAS
2007
13 years 11 months ago
Engineering Communities of Web Services
This paper presents an approach that provides the necessary assistance to those who are in charge of engineering communities of Web services. Current practices indicate that Web se...
Sattanathan Subramanian, Philippe Thiran, Zakaria ...