Sciweavers

IJNSEC
2008
115views more  IJNSEC 2008»
13 years 11 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
AI
2006
Springer
13 years 11 months ago
Shifting viewpoints: Artificial intelligence and human-computer interaction
The AI and HCI communities have often been characterized as having opposing views of how humans and computers should interact. As both of them evolve, there is a deeper contrast t...
Terry Winograd
CORR
2010
Springer
67views Education» more  CORR 2010»
13 years 11 months ago
From Frequency to Meaning: Vector Space Models of Semantics
Computers understand very little of the meaning of human language. This profoundly limits our ability to give instructions to computers, the ability of computers to explain their ...
Peter D. Turney, Patrick Pantel
CSREASAM
2006
14 years 27 days ago
Adaptive Security Metrics for Computer Systems
The major concern for a computer system is its security and integrity. It is necessary to check the security level of your system and keep it updated. This can be best achieved by ...
Satish Baddelpeli, Gregory Vert
CRITICAL
2005
14 years 1 months ago
Comparing two approaches to context: realism and constructivism
During the last few years, there have been debates over what is context and how computers should act upon it. Two disparate camps of thought can be recognized. First, Realism, hav...
Antti Oulasvirta, Sakari Tamminen, Kristina Hö...
ASSETS
2008
ACM
14 years 1 months ago
Sudoku access: a sudoku game for people with motor disabilities
Educational games are a beneficial activity motivating a large number of students in our society. Unfortunately, disabled people have reduced opportunities when using a computer g...
Stéphane Norte, Fernando G. Lobo
ASSETS
1994
ACM
14 years 3 months ago
Providing access to graphical user interfaces - not graphical screens
ls of abstraction which make up a graphical user interface. The Power of GUIs For much of their history, computers have been capable of presenting only textual and numeric data to ...
W. Keith Edwards, Elizabeth D. Mynatt, Kathryn Sto...
IPPS
2003
IEEE
14 years 4 months ago
Recovery Schemes for High Availability and High Performance Distributed Real-Time Computing
Clusters and distributed systems offer fault tolerance and high performance through load sharing, and are thus attractive in real-time applications. When all computers are up and ...
Lars Lundberg, Daniel Häggander, Kamilla Klon...
IPPS
2003
IEEE
14 years 4 months ago
Using Golomb Rulers for Optimal Recovery Schemes in Fault Tolerant Distributed Computing
Clusters and distributed systems offer fault tolerance and high performance through load sharing. When all computers are up and running, we would like the load to be evenly distrib...
Kamilla Klonowska, Lars Lundberg, Håkan Lenn...
ITICSE
2004
ACM
14 years 4 months ago
An assistive technology project for an HCI course
This presentation describes a project for a standard undergraduate human-computer interaction (HCI) course that incorporates issues related to users who are disabled. It is part o...
Blaise W. Liffick