Sciweavers

53 search results - page 5 / 11
» cROVER: Improving ROVER using automatic error detection
Sort
View
DSN
2002
IEEE
14 years 10 days ago
Masquerade Detection Using Truncated Command Lines
A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
Roy A. Maxion, Tahlia N. Townsend
IJCNLP
2005
Springer
14 years 26 days ago
Relation Extraction Using Support Vector Machine
This paper presents a supervised approach for relation extraction. We apply Support Vector Machines to detect and classify the relations in Automatic Content Extraction (ACE) corpu...
Gum-Won Hong
INFOCOM
2007
IEEE
14 years 1 months ago
Neighborhood Watch for Internet Routing: Can We Improve the Robustness of Internet Routing Today?
— Protecting BGP routing from errors and malice is one of the next big challenges for Internet routing. Several approaches have been proposed that attempt to capture and block ro...
Georgos Siganos, Michalis Faloutsos
BMCBI
2007
144views more  BMCBI 2007»
13 years 7 months ago
Automatic delineation of malignancy in histopathological head and neck slides
Background: Histopathology, which is one of the most important routines of all laboratory procedures used in pathology, is decisive for the diagnosis of cancer. Experienced histop...
Mutlu Mete, Xiaowei Xu, Chun-Yang Fan, Gal Shafirs...
EPIA
1999
Springer
13 years 11 months ago
Improving Optical Music Recognition by Means of Abductive Constraint Logic Programming
In this paper we propose a hybrid system that bridges the gap between traditional image processing methods, used for low-level object recognition, and abductive constraint logic pr...
Miguel Ferrand, João Alexandre Leite, Am&ia...