Sciweavers

284 search results - page 43 / 57
» A new approach to evaluate GP schema in context
Sort
View
RAID
1999
Springer
15 years 4 months ago
Improving Intrusion Detection Performance using Keyword Selection and Neural Networks
The most common computer intrusion detection systems detect signatures of known attacks by searching for attack-specific keywords in network traffic. Many of these systems suffer ...
Richard Lippmann, Robert K. Cunningham
COMPGEOM
1997
ACM
15 years 4 months ago
Robust Proximity Queries: An Illustration of Degree-Driven Algorithm Design
Abstract. In the context of methodologies intended to confer robustness to geometric algorithms, we elaborate on the exact-computation paradigm and formalize the notion of degree o...
Giuseppe Liotta, Franco P. Preparata, Roberto Tama...
LREC
2010
188views Education» more  LREC 2010»
15 years 1 months ago
Pattern-Based Extraction of Negative Polarity Items from Dependency-Parsed Text
We describe a new method for extracting Negative Polarity Item candidates (NPI candidates) from dependency-parsed German text corpora. Semi-automatic extraction of NPIs is a chall...
Fabienne Fritzinger, Frank Richter, Marion Weller
ECIS
2004
15 years 1 months ago
From asp to web services: identifying key performance areas and indicators for healthcare
Value creation from e-business for customers in healthcare is an important topic in academic and practitioner circles. This paper reports the findings from a two-year research stu...
Matthew W. Guah, Wendy L. Currie
ENTCS
2007
114views more  ENTCS 2007»
14 years 11 months ago
Reporting Failures in Functional Logic Programs
Computing with failures is a typical programming technique in functional logic programs. However, there are also situations where a program should not fail (e.g., in a determinist...
Michael Hanus