Sciweavers

4270 search results - page 101 / 854
» A Permutation Approach to Validation
Sort
View
ICUMT
2009
15 years 2 months ago
A syntactic approach for identifying multi-protocol attacks
In the context of multiple security protocols running in the same environment, we propose a syntactical approach for identifying multi-protocol attacks. The proposed approach uses ...
Béla Genge, Piroska Haller
ICDE
2008
IEEE
191views Database» more  ICDE 2008»
16 years 5 months ago
An Algebraic Approach to Rule-Based Information Extraction
Traditional approaches to rule-based information extraction (IE) have primarily been based on regular expression grammars. However, these grammar-based systems have difficulty scal...
Frederick Reiss, Sriram Raghavan, Rajasekar Krishn...
IAT
2009
IEEE
15 years 11 months ago
Automated Web Site Evaluation - An Approach Based on Ranking SVM
This paper proposes an automated web site evaluation approach using machine learning to cope with ranking problems. Evaluating web sites is a significant task for web service beca...
Peng Li, Seiji Yamada
QSIC
2009
IEEE
15 years 11 months ago
A Bayesian Approach for the Detection of Code and Design Smells
The presence of code and design smells can have a severe impact on the quality of a program. Consequently, their detection and correction have drawn the attention of both research...
Foutse Khomh, Stéphane Vaucher, Yann-Ga&eum...
ACISICIS
2008
IEEE
15 years 11 months ago
An Integer Linear Programming Approach for Dedicated Machine Constraint
Dedicated machine constraint is one of the new challenges introduced in photolithography machinery of the semiconductor manufacturing system due to natural bias. Previous research...
Huy Nguyen Anh Pham, Arthur M. D. Shr, Peter P. Ch...