Sciweavers

525 search results - page 93 / 105
» expert 2006
Sort
View
ISI
2006
Springer
13 years 9 months ago
Suspect Vehicle Identification for Border Safety with Modified Mutual Information
The Department of Homeland Security monitors vehicles entering and leaving the country at land ports of entry. Some vehicles are targeted to search for drugs and other contraband. ...
Siddharth Kaza, Yuan Wang, Hsinchun Chen
SAC
2006
ACM
13 years 9 months ago
A domain-specific language for task handlers generation, applying discrete controller synthesis
We propose a simple programming language, called Nemo, specific to the domain of multi-task real-time embedded systems, such as in robotic, automotive or avionics systems. It can ...
Gwenaël Delaval, Éric Rutten
INFSOF
2007
83views more  INFSOF 2007»
13 years 9 months ago
On the design of more secure software-intensive systems by use of attack patterns
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Michael Gegick, Laurie Williams
KBS
2007
100views more  KBS 2007»
13 years 9 months ago
A retraining methodology for enhancing agent intelligence
Data mining has proven a successful gateway for discovering useful knowledge and for enhancing business intelligence in a range of application fields. Incorporating this knowledg...
Andreas L. Symeonidis, Ioannis N. Athanasiadis, Pe...
KBS
2007
101views more  KBS 2007»
13 years 9 months ago
A Knowledge Base for the maintenance of knowledge extracted from web data
By applying web mining tools, significant patterns about the visitor behavior can be extracted from data originated in web sites. Supported by a domain expert, the patterns are v...
Juan D. Velásquez, Vasile Palade