Sciweavers

1575 search results - page 253 / 315
» A Behavioral Analysis of Computational Models of Visual Atte...
Sort
View
USS
2010
14 years 9 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
IAT
2008
IEEE
15 years 6 months ago
Intent-Driven Insider Threat Detection in Intelligence Analyses
In intelligence analysis, information plays an important role in solving problems and making decisions. However, an increasing number of malicious behaviors, most of which come fr...
Eugene Santos Jr., Hien Nguyen, Fei Yu, Keum Joo K...
CONEXT
2006
ACM
15 years 5 months ago
Compositional control of IP media
Abstract— In many IP media services, the media channels are point-to-point, dynamic, and set up with the participation of one or more application servers, even though the media p...
Pamela Zave, Eric Cheung
BIRTHDAY
2006
Springer
15 years 3 months ago
Research Perspectives for Logic and Deduction
The article is meant to be kind of the author's manifesto for the role of logic and deduction within Intellectics. Based on a brief analysis of this role the paper presents a...
Wolfgang Bibel
ACL
2011
14 years 3 months ago
Better Hypothesis Testing for Statistical Machine Translation: Controlling for Optimizer Instability
In statistical machine translation, a researcher seeks to determine whether some innovation (e.g., a new feature, model, or inference algorithm) improves translation quality in co...
Jonathan H. Clark, Chris Dyer, Alon Lavie, Noah A....