Sciweavers

207 search results - page 38 / 42
» ideas 1998
Sort
View
KDD
1998
ACM
140views Data Mining» more  KDD 1998»
13 years 12 months ago
Blurring the Distinction between Command and Data in Scientific KDD
We have been working on two different KDD systems for scientific data. One system involves comparative genomics, where the database contains more than 60,000 plant gene and protei...
John V. Carlis, Elizabeth Shoop, Scott Krieger
VW
1998
Springer
176views Virtual Reality» more  VW 1998»
13 years 12 months ago
A Mixed 2D/3D Interface for Music Spatialization
We propose a system for controlling in real time the localisation of sound sources. The system, called MidiSpace, is a real time spatializer of Midi music. We raise the issue of wh...
François Pachet, Olivier Delerue
AINA
2004
IEEE
13 years 11 months ago
Online Training of SVMs for Real-time Intrusion Detection
Abstract-- As intrusion detection essentially can be formulated as a binary classification problem, it thus can be solved by an effective classification technique-Support Vector Ma...
Zonghua Zhang, Hong Shen
FLAIRS
2007
13 years 10 months ago
Probabilistic Task Content Modeling for Episodic Textual Narratives
Episodic knowledge is often stored in the form of textual narratives written in natural language. However, a large repository of such narratives will contain both repetitive and n...
Eni Mustafaraj, Martin Hoof, Bernd Freisleben
CCS
2008
ACM
13 years 9 months ago
Multi-use unidirectional proxy re-signatures
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key in...
Benoît Libert, Damien Vergnaud