Sciweavers

15375 search results - page 16 / 3075
» cans 2008
Sort
View
PST
2008
13 years 9 months ago
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Mimicry attacks have been the focus of detector research where the objective of the attacker is to generate an attack that evades detection while achieving the attacker's goa...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
JSS
2008
157views more  JSS 2008»
13 years 7 months ago
Can k-NN imputation improve the performance of C4.5 with small software project data sets? A comparative evaluation
Missing data is a widespread problem that can affect the ability to use data to construct effective prediction systems. We investigate a common machine learning technique that can...
Qinbao Song, Martin J. Shepperd, Xiangru Chen, Jun...
DSML
2008
107views Formal Methods» more  DSML 2008»
13 years 9 months ago
How Web 2.0 can Leverage Model Engineering in Practice
: Today's online model repositories offer to download and view the textual specifications of e.g. metamodels and models in the browser. For users, in order to efficiently sear...
Manuel Wimmer, Andrea Schauerhuber, Michael Stromm...
IADIS
2004
13 years 9 months ago
Computer-mediated communication: what can we learn from a diverse range of users?
The demographics of computer-mediated communication (CMC) users have changed considerably over the last twenty years. Whereas in the 1980's it was largely academics, and comp...
Sanjeet Bhachu, D. Ramanee Peiris, Annalu Waller
IANDC
2008
122views more  IANDC 2008»
13 years 7 months ago
Automata can show PSpace results for description logics
In the area of Description Logic (DL), both tableau-based and automata-based algorithms are frequently used to show decidability and complexity results for basic inference problem...
Franz Baader, Jan Hladik, Rafael Peñaloza