Sciweavers

1616 search results - page 234 / 324
» networks 2002
Sort
View
COLING
2002
13 years 10 months ago
Towards a Noise-Tolerant, Representation-Independent Mechanism for Argument Interpretation
We describe a mechanism for the interpretation of arguments, which can cope with noisy conditions in terms of wording, beliefs and argument structure. This is achieved through the...
Ingrid Zukerman, Sarah George
COMCOM
2002
189views more  COMCOM 2002»
13 years 10 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
CORR
2002
Springer
139views Education» more  CORR 2002»
13 years 10 months ago
Symbolic Methodology in Numeric Data Mining: Relational Techniques for Financial Applications
Currently statistical and artificial neural network methods dominate in financial data mining. Alternative relational (symbolic) data mining methods have shown their effectiveness...
Boris Kovalerchuk, Evgenii Vityaev, H. Yusupov
CSCW
2002
ACM
13 years 10 months ago
Using speakeasy for ad hoc peer-to-peer collaboration
Peer-to-peer systems appear promising in terms of their ability to support ad hoc, spontaneous collaboration. However, current peer-to-peer systems suffer from several deficiencie...
W. Keith Edwards, Mark W. Newman, Jana Z. Sedivy, ...
DEDS
2002
90views more  DEDS 2002»
13 years 10 months ago
Perturbation Analysis for Stochastic Fluid Queueing Systems
Recent study for congestion control in high speed networks indicates that the derivative information for the congestion at the common buffer for multiple sources could be useful i...
Yong Liu, Weibo Gong