Sciweavers

29 search results - page 2 / 6
» Intention modelling: approximating computer user intentions ...
Sort
View
IAT
2008
IEEE
13 years 11 months ago
Intent-Driven Insider Threat Detection in Intelligence Analyses
In intelligence analysis, information plays an important role in solving problems and making decisions. However, an increasing number of malicious behaviors, most of which come fr...
Eugene Santos Jr., Hien Nguyen, Fei Yu, Keum Joo K...
WEBI
2007
Springer
13 years 11 months ago
Contextual Prediction of Communication Flow in Social Networks
The paper develops a novel computational framework for predicting communication flow in social networks based on several contextual features. The problem is important because pred...
Munmun De Choudhury, Hari Sundaram, Ajita John, Do...
RV
2007
Springer
151views Hardware» more  RV 2007»
13 years 11 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
JUCS
2006
185views more  JUCS 2006»
13 years 4 months ago
The Berlin Brain-Computer Interface: Machine Learning Based Detection of User Specific Brain States
We outline the Berlin Brain-Computer Interface (BBCI), a system which enables us to translate brain signals from movements or movement intentions into control commands. The main co...
Benjamin Blankertz, Guido Dornhege, Steven Lemm, M...
CAD
2008
Springer
13 years 4 months ago
Detecting approximate symmetries of discrete point subsets
Detecting approximate symmetries of parts of a model is important when attempting to determine the geometric design intent of approximate boundary-representation (B-rep) solid mod...
Ming Li, Frank C. Langbein, Ralph R. Martin